Content deleted Content added
Mindmatrix (talk | contribs) m Reverted edits by 41.43.228.242 (talk) to last version by Rwessel |
|||
Line 299:
Besides privacy concerns, cookies also have some technical drawbacks. In particular, they do not always accurately identify users, they can be used for security attacks, and they are often at odds with the Representational State Transfer ([[Representational State Transfer|REST]]) software architectural style.<ref>{{cite news |url=http://roy.gbiv.com/pubs/dissertation/evaluation.htm |title=Fielding Dissertation: CHAPTER 6: Experience and Evaluation |first=Roy |last=Fielding |year=2000 |accessdate=2010-10-14}}</ref><ref>{{cite web |first=Stefan |last=Tilkov |url=http://www.infoq.com/articles/rest-anti-patterns |title=REST Anti-Patterns |publisher=InfoQ |date=July 2, 2008 |accessdate=2009-01-04}}</ref>
If more than one browser is used on a computer, each usually has a separate storage area for cookies. Hence cookies do not identify a person, but a combination of a user account, a computer, and a web browser. Thus, anyone who uses multiple accounts, computers, or browsers has multiple sets of cookies.
|