view doc/Cookies.txt @ 1255:5d6869b28e4d

treat ideographic characters (Chinese/Japanese) as words
author corvid <corvid@lavabit.com>
date Sun, 02 Aug 2009 03:59:14 +0000
parents da766fa9efed
children 760d31f49672
line wrap: on
line source
Jan 2002, Jörgen Viksell - jorgen.viksell@telia.com,
          Jorge Arellano Cid --
Last update: October 2008


==================
 Cookies in Dillo
==================

Supported: old Netscape style, RFC 2109, RFC 2965.

Cookies are handled by a dpi (plugin) which shares them between your
instances of Dillo.

When the dpi exits, cookies that you have ACCEPTed are saved to
~/.dillo/cookies.txt, and ACCEPT_SESSION cookies are forgotten.
(Currently the only limit to the amount of cookies to save to disk is
a maximum of 20 per domain.)
The dpi normally exits after a period of inactivity, but you can force it to
exit with the command "dpidc stop".


=====================
 Controlling cookies
=====================

Out of the box, dillo rejects all cookies.


If you want to accept certain cookies, you can specify rules for different
domains in the file ~/.dillo/cookiesrc. The syntax looks like:

DEFAULT       DENY
slashdot.org  ACCEPT
.host.com     ACCEPT_SESSION

Line 1: Deny all cookies from all domains not otherwise specified.
Line 2: Accept all cookies from slashdot.org, and save them to
        ~/.dillo/cookies.txt when the cookies dpi exits.
Line 3: Accept all cookies from all subdomains of host.com, but
        do not save them when the dpi exits.


If you are positive that you will never want any cookies, you can
configure/compile Dillo without cookie support. The option is:
./configure --disable-cookies


===================
 Cookies & Privacy
===================

 Cookies can be a severe threat to personal privacy. The pages you
visit can be tracked, logged, and associated to a peronal data-record,
allowing the possibility of building a detailed profile of your
browsing habits.

 This data is sold to companies that profit from direct use of such
information (SPAM, Spying, etc).

 If this data is cross-referenced with other databases, they can end up
with more information than you have about yourself.

 Some people may tell you this is "paranoid". But please, take my words
as those of someone that has written a web browser, a cookies implementation,
and that has deep understanding of HTTP (RFC-2068) and cookies (RFC-2965).

 Non technical persons may like to read:
   http://www.junkbusters.com/cookies.html

 The dillo project is especially concerned about privacy and security
issues. Our advice is to avoid cookies whenever possible and at most set
ACCEPT_SESSION to specific, trusted sites.  -- You have been warned.


Thats all folks!