Content deleted Content added
Reverted 1 pending edit by 197.156.86.200 to revision 698339744 by Trappist the monk: Unexplained removal of content |
|||
Line 299:
Besides privacy concerns, cookies also have some technical drawbacks. In particular, they do not always accurately identify users, they can be used for security attacks, and they are often at odds with the Representational State Transfer ([[Representational State Transfer|REST]]) software architectural style.<ref>{{cite news |url=http://roy.gbiv.com/pubs/dissertation/evaluation.htm |title=Fielding Dissertation: CHAPTER 6: Experience and Evaluation |first=Roy |last=Fielding |year=2000 |accessdate=2010-10-14}}</ref><ref>{{cite web |first=Stefan |last=Tilkov |url=http://www.infoq.com/articles/rest-anti-patterns |title=REST Anti-Patterns |publisher=InfoQ |date=July 2, 2008 |accessdate=2009-01-04}}</ref>
[[01280852945]]<ref>Қ01280852945د</ref>===Inaccurate identification===
If more than one browser is used on a computer, each usually has a separate storage area for cookies. Hence cookies do not identify a person, but a combination of a user account, a computer, and a web browser. Thus, anyone who uses multiple accounts, computers, or browsers has multiple sets of cookies.
|