BitBrowser
Official WebsiteDownloadContact Us
BitBrowser
BitBrowser
  • BitBrowser - Professional Anti-detect Browser
  • Guide(Graphic)
    • Quick Start
      • OS and Hardware
      • Sign Up, Download and Install
      • Subscribe, Change plan and Renew
    • Browser Profiles
      • Add a new browser profile
      • Batch lmport Profiles
      • Batch add
      • Features and functions
      • Export browser profiles
      • Batch update browser profiles
      • Batch export cookies/Batch update cookies
    • Recycle Bin
    • Users
      • Roles and Permissions
      • Add Users and Set Permissions
    • Referral
    • Proxy
      • Http/Https/Sock5/Ssh
      • Luminati/Oxylabs/Iphtml/Ipidea
      • Extract proxy IP with api
      • How to use Rola-IP
      • How to use Dove Proxy
      • How to use IPIDEA
      • How to use Proxy302
      • How to use Pia S5
      • How to use 922 S5
      • How to use IP2World Proxy in BitBrowser?
      • How to use IPHTML
      • How to use BrightData
      • How to use PYPROXY S5
      • How to Setup NetNut Proxy on BitBrowser Browser
      • How to Set Up Swiftproxy Proxy
      • Proxy IP Management
    • Extensions
    • Account Security
      • How to change password
      • How to retrieve the password
      • How to retrieve the username
      • How to turn on two-factor verification
  • Guide(Videos)
    • Introduction
    • Users
    • Http/Https/Socks5 Proxy
    • Luminati/Oxylabs/Iphtml Proxy
    • Extract IP
    • IPIDEA Proxy
    • ABCproxy
  • Q&A
    • Getting Started
      • Introduction
      • Support for trial
      • How many users can be created?
      • Which platforms are supported?
      • What browser management can do?
      • What groups can be used for?
      • Do we provide proxy IP?
      • How to choose a proxy type?
    • Issues
      • Import failed
      • Display blank
      • Crashed
      • Browser launch failed
      • Why is there a discrepancy in IP detection?
      • How to increase or decrease users?
      • How to get promotion rewards?
      • How to detect the local network environment?
      • Why do programs crash or get stuck when the computer memory is clearly not full?
    • Master Tutorial
      • Save proxy traffic with proxy IP balcklist function
      • How to import bookmarks for all browsers?
      • How to autofill passwords for all browsers?
      • How many accounts can each browser manage?
      • How to clone a browser profile?
      • How to clear cache files and change cache directory of browser profile?
      • How to use Auto Paste?
      • How to import cookies to a browser profile?
      • How to fix the browser proxy failure?
      • How to identify different browsers on the taskbar?
      • How to update user permission?
  • API Docs
    • Introduction
    • API Issues
    • Browser Profiles
    • Groups
    • Example of interface request parameters
    • Local Library Data Interface
    • Appendix
    • Cloud Phone Profiles
  • RPA Guide
    • RPA Usage Guide
  • Browser Fingerprinting
    • IPv4
    • IPv6
    • Language
    • Resolution
    • Audio
    • Timezone
    • localStorage
    • Geo
    • Fonts
    • Do Not Track
    • SSL
    • Proxy
    • DNS
    • Cookie
    • Canvas
    • WebGL
    • User Agent
    • IndexedDB
    • WebRTC
  • Upgrade Log
  • ⚒️Synchronize System
    • Guide(Graphic)
    • Guide(Video)
    • Q&A
  • Cloud Phone
    • Time-Based Billing
      • Introduction
      • Add Phone Profile
      • Basic Features of Cloud Phone
      • Basic Features of Phone Profile
      • Batch Update Phone Profiles
      • Batch Import/Export Phone Profile
      • Computing Power Basic Features
      • Cloud phone Bill
    • Plan-Based Billing
      • Cloud Phone(Video)
      • Cloud Phone(Graphic)
        • Introduction
        • Phone Profiles
          • Subscribe
          • Add
          • Basic features
            • Edit Seq
            • Update Profile Name
            • Update Group
            • Update Proxy
            • Update Remarks
            • Edit Profile
            • Open/Close Phone Profile
            • Search Phone Profiles
            • Customize Columns
            • Adjust Phone Profile Window Bounds
            • Files
            • Fav
            • Createable Phone Profiles
        • Computing Power
          • Purchase Computing Power
          • Basic features
            • Search power
            • Edit Computing Power Name
            • Update Remarks
            • Renew
            • Auto-renewal
            • Delete Computing Power
        • Phone Profile Group
          • Add Group
          • Search Group
          • Basic features
        • Cloud Phone Basics
        • Cloud Phone Bill
        • Proxy IP
          • How to set up 922 S5 proxy
    • Synchronizer
      • Graphic
Powered by GitBook
On this page
  1. Browser Fingerprinting

Cookie

HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and more than one cookie may be placed on a user's device during a session.

Cookies serve useful and sometimes essential functions on the web. They enable web servers to store stateful information (such as items added in the shopping cart in an online store) on the user's device or to track the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past). They can also be used to save for subsequent use information that the user previously entered into form fields, such as names, addresses, passwords, and payment card numbers.

Authentication cookies are commonly used by web servers to authenticate that a user is logged in, and with which account they are logged in. Without the cookie, users would need to authenticate themselves by logging in on each page containing sensitive information that they wish to access. The security of an authentication cookie generally depends on the security of the issuing website and the user's web browser, and on whether the cookie data is encrypted. Security vulnerabilities may allow a cookie's data to be read by an attacker, used to gain access to user data, or used to gain access (with the user's credentials) to the website to which the cookie belongs (see cross-site scripting and cross-site request forgery for examples).

Tracking cookies, and especially third-party tracking cookies, are commonly used as ways to compile long-term records of individuals' browsing histories — a potential privacy concern that prompted European and U.S. lawmakers to take action in 2011. European law requires that all websites targeting European Union member states gain "informed consent" from users before storing non-essential cookies on their device.

Source: https://en.wikipedia.org/wiki/HTTP_cookie

PreviousDNSNextCanvas

Last updated 2 years ago