7
Top  
Newsletter 9/07/2025 If you find this article of value, please help keep the blog going by making a contribution at GoFundMe or Paypal Back to Contents


Cookies: The Good, the Bad, and the Ugly
Going on the Defense


Like many things in modern life today, cookies are not inherently good, bad, nor ugly.  It depends on the use to which cookies are put.  Cloudflare defined cookies as, "small files of information that a web server generates and sends to a web browser."  The Cloudflare article linked above is also an excellent and thorough discussion of cookies in general. 

Often websites users frequently visit already know the username of users when they first land on that site.  That instant ID happens because information about a frequent visitor is stored in a cookie.  That might be considered one of the good things cookies can do.  One of the bad aspects of cookies is that cookies track users across the Internet.  When cookies catalog much of what users do across many different websites, a rather complete profile of an individual user can be created.  If that user profile falls into the wrong hands, the victim could be exposed to some kind of identity theft.  The ugly side of cookies is that cookies can be exploited to facilitate malware attacks.  Cybersecurity News, on April 23, 2025, reported on how stolen cookies were abused to bypass users' credentials for identity authentication purposes, including MFA, to impersonate users, and thereby infiltrating server networks.  As the Cybersecurity News put it, "This makes them one of the most valuable targets for infostealers and threat actors."

In a simpler and more innocent time, say before Microsoft Internet Explorer 7 in 2006, cookies were stored as text (.txt) files on the local machine.  Since cookies were then stored as txt files, cookie files could be opened and read by any text editor, say like Windows Notepad.  Cookies were in a Windows folder labeled "Cookies," and thus were somewhat easier to remove.  Since then, cookies are stored in the web browser's cache in a database files that cannot be easily read or deleted by users. 

To delete cookies today, certain steps from within the browser Settings must be followed.  There are numerous good reasons for deleting cookies.  Deleting unwanted cookies will help keep a user's identity private in today's increasingly interconnected world.  Another reason for cookie deletion is that doing so will prevent one website from cross-referencing information from a different website.  The downside of deleting cookies is any information stored within that cookie, like username and password, will also be deleted.  Thus, forcing a user to log back into that website the next time that website is visited.  Another downside of deleting cookies is that the next time a user visits the site that had its cookies deleted, that infinitely annoying Cookie Permissions check box will pop back up. 

What follows is a tutorial on how to selectively delete cookies from a  browser's Settings in either Google Chrome or Microsoft Edge.  By selectively deleting cookies, a user can mitigate the downsides of cookie deletion by leaving in place those cookies that are known to the user, and thus websites that are frequently visited.

In both Google Chrome and Microsoft Edge, the steps and processes discussed herein are very similar.  The first step is to get into the Settings menu.  In both browsers there is 3 dot control that appears in the top right hand corner of the either browser's screen.  When the 3 dot control is clicked a menu of possible tasks appears.  Scroll down and click "Settings."
Settings for Edge Settings for Chrome
The easiest way to delete cookies is to simply delete ALL the Cookies.  This will, however, log you out of all websites.  Except on Chrome, where you will stay logged into your Google account.  Before you take this simple step be sure that you have all the usernames and passwords to log back in to all the accounts. The example below is for Edge.  I personally do not use Edge for much except reading the MSN news feed and Microsoft Designer AI image generator.  So, Edge was a good candidate for demonstrating how to delete all cookies.  Click Delete Browsing data highlighted in green above.
First, select the time span of data that you want to delete. Then, select what you want to delete by checking the appropriate box. 
After you delete all cookies, the next time you go to any of the websites that require username and passwords, you will be forced to log in with those credentials once again.  Moreover, any lists that were saved to that website will also be deleted.  And, as mentioned above, the Cookie Permissions Checkbox might well reappear.

On the other hand, if you want to preserve data saved to trusted sites, and only delete data from sites that you have no investment in, you then must delete cookies one website at a time.  The upside that you are in control of which websites' cookies retain your data.  The downside is this process is very tedious and time consuming. There are no shortcuts here.

From within Chrome, click the 3 dot control to open the Chrome menu.  Scroll down to the bottom of the menu, and click Settings.  When the Settings menu opens, click Privacy and security.  Scroll down to the bottom of the menu that is displayed on the right.  Click Site settings.
 
When Site setting opens, click View permissions and data stored across site.  This will open the list of all of the cookies stored within the browser.  It can be a bit unnerving when you are confronted with the fact that websites that you have never even visited have left their footprints on your browser
 
When view permissions is opened, a long list of websites that have stored data within your browser is displayed.  You can sort this list by (a) Most visited, which might help decide if you want to keep this data; (b) Data stored is the total amount of data saved within cookies, and is not the number of cookies; (c) Name sorts alphabetical by domain name.
 
The trashcan icon will delete the cookie and any other data associated with the cookie.  The downward arrow opens up the list of all the types of data associated with that website.  This is where things get interesting.  Below is an example of data stored by my visiting CVS.com.  Notice the domain cdn.appdynamics.com and that that cookie is "Partitioned."  According to Wikipedia, AppDynamics "focuses on managing the performance and availability of applications across cloud computing environments, IT infrastructure, network architecture, digital user experience design, application security threat detection, observability, and data centers."  [Oh Yeah. Slice me off a piece of that.]  Also, take notice of the fact that the cookie for AppDynamics is also Partitioned.  According to the Google Gemini AI, Partitioned "refers to a privacy feature that isolates cookies based on the top-level website they are associated with."  One benefit of the  Partitioning of cookie data is that Partitioning prevents Cross-Site Tracking.  Cross-Site Tracking is occurs when, "a third-party service could set a cookie when embedded on one website and then access that same cookie when embedded on a completely different website. This allowed for tracking user activity across unrelated sites."  So, from CVS.com, my browser had three separate pieces of data stored on it.  From here, the choices are delete the data by clicking the top trashcan icon, or delete the individual pieces of data by clicking each individual trashcan icon.

 

 
It can be quite jarring when you look at all the various websites and/or servers that have planted data in your browser.  I did not expect, but was not all that surprised either, to see that a webserver located in Russia had planted its data in my browser.  Below is what I had found inside the cookies set by the common US News site, politico.com.  Any website where the URL ends in ".ru" comes from Russia.  And it is my opinion that nothing comes From Russia With Love.
 
I found other bits of site data that had emanated from Russia.  The domain shown below, dmg.digitaltarget.ru, was also present in different cookies.  The screenshot shows that this is not a benign marketing website.  Data from web servers located in Pakistan were also found.
 

As I said at the outset, going through each cookie saved into the browser cache was tedious, to say the least.  On the other hand, it was neither a waste of time; nor was doing so merely an academic exercise.  The process yielded real tangible results.  I got the Russkies out of my digital system, and I learned a great deal more about the nature of cookies. 

As the subtitle of this article implies, what is laid out here in is in a defensive posture.  The harm, if any, was already done.  The steps outlined herein are meant to mitigate the effects of cookies automatically stored in the browser cache. 

Of course, I now must deal with these nagging popups again.

 

I don't get sent anything strange like underwear. 
I get sent cookies.

— Jennifer Aniston  

 

¯\_(ツ)_/¯¯
Gerald Reiff
Back to Top previous post next post TBA →
If you find this article of value, please help keep the blog going by making a contribution at GoFundMe or Paypal