[sf-lug] cookies in Ubuntu

Ehud Kaldor ehud.kaldor at gmail.com
Tue Jul 5 23:06:16 PDT 2011


to add some to Rick's recommendations for plugins in the slides (if
privacy is indeed the topic at hand), two more that i found recently,
for firefox:

    ghostery - tells you what tracking authorities are tracking you for
    each site you go to, and allows you to block them.

    certwatch - tells you who issued the certificate of any new ssl site
    you go to, and tells you if it changed, subsequently. good against
    certificate hijacking.


--Ehud


On 07/05/2011 10:42 PM, Rick Moen wrote:
> Quoting Mikki McGee (mikkimc at earthlink.net):
>
>> Are cookies or other identifiers added, in Ubuntu?  If so, where and
>> how does one locate them to identify and or delete them?
> 'Cookies' (aka 'magic cookies') is a rather general concept in computing
> (including Linux computing), and it's likely you are intending to ask
> about one specific type of cookie but not others.
>
> You probably mean HTTP cookies, aka Web cookies, aka browser cookies.
> See:   https://secure.wikimedia.org/wikipedia/en/wiki/HTTP_cookie
> There are also:
>
> o  X Window System cookies (which have nothing particularly to do with 
>    Web browsers)
> o  'Flash cookies', which Adobe calls Local Shared Objects (LSOs)
>
> To address as stated your question about location:  HTTP cookies are
> stored on any given system wherever the Web browser client program puts
> them.  Firefox on Linux stores them in
> ~/.mozilla/firefox/[userhash]/cookies.sqlite, which as the name suggests
> is a SQLite database file.
>
> 'To identify or delete them', you say?  Hmm, well, knowing the directory
> location of the SQlite database doesn't help you do that, because what
> you probably want to do is examine, delete, and otherwise manage HTTP
> cookies from _inside_ of your Web browser, instead of at the file level.
>
> In Firefox, go to Edit menu, Preferences, Privacy, 'remove individual
> cookies'.  This will bring up a Cookies window showing a scrolling
> display of all currently stored HTTP cookies and domain and what the
> content, path, type of associated connection, and expiration data is for
> each.  Don't be surprised if the 'Content' field is most often gibberish
> to you.  Anyhow, rummaging through, editing, and pruning the stored HTTP
> cookies has the net effect of editing the aforementioned SQLite file.
>
> As you will see in my lecture slides and notes from my Feb. 2001 talk
> about browser security in front of SVLUG (SVLUG News column on
> http://www.svlug.org/), one of my strong recommendations is Beef Taco, a
> parcel of deliberately long-lived HTTP cookies you can load to preempt
> the ones you probably most want to avoid.
>
> You will also note on Slide 9 the large list of other places a browser
> provides that can be used by Web sites to store 'cookie'-type
> information in local browser state, and on slide 10 the core of my
> argument that Javascript is the key technology that must be corralled
> by the user to curb abuse.  (Sorry, but the slides do not purport to 
> contain my entire lecture; they were merely props / bullet points for
> it.  However, they + the lecture notes aim to come at least close.)
>
>
> _______________________________________________
> sf-lug mailing list
> sf-lug at linuxmafia.com
> http://linuxmafia.com/mailman/listinfo/sf-lug
> Information about SF-LUG is at http://www.sf-lug.org/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://linuxmafia.com/pipermail/sf-lug/attachments/20110705/cead6482/attachment.html>


More information about the sf-lug mailing list