|IE6 blocking banner cookies|
| 6:08 pm on Aug 30, 2001 (gmt 0)|
split from this thread
>(The default setting on IE6 is going to be) hard on publishers. I checked one of my pages that serves a rotating mix of Engage, CJ, and ClickXchange banners and buttons and the default-level security setting launched an alert box that would scare JohnQ.
>Leave your cookie security setting at the default and try not to kill the alert box forever via the "Don't show this again" checkbox when it pops up. It appears banners are triggering it bigtime.
Anyone watching the cookie blocking (click icon down in the lower bar, red circle with minus-sign)? I see engage and other ad server cookies being blocked.
| 2:47 pm on Aug 31, 2001 (gmt 0)|
Nice move, M$. I don't understand why cookies would be disabled by default. I am sure ActiveX, arguably IE's biggest security hole, is enabled by default.
So, when IE6 becomes the most widely used browser, what will advertisers and publishers use? It sounds like cookie duration could end up meaning very little, as well as targetting, etc for bannerbrokers.
| 4:13 pm on Aug 31, 2001 (gmt 0)|
Have heard from a couple of members that there is a move in the adult sector to forcefully mandate cookie usage that will circumvent IE's handling. They are intentionally moving thier cookie routines off site, yet requiring cookies be enabled to use the site.
| 4:38 pm on Aug 31, 2001 (gmt 0)|
For years, I've been taking some adult sites web concepts and morphing them to fit travel & real estate, but this isn't going to be one of them.
Just to clarify for others that may be reading this, the banners themselves are not being blocked -just the cookies. This means that credit for impressions, clicks, sales generated, etc. may not be attributed to the publisher. I.E., no money.
It appears that the ad networks can get their certification in order and have their banners accepted... for instance, Burstnet banners do not seem be having their cookies blocked.
| 1:12 am on Sep 6, 2001 (gmt 0)|
An industry group worked out a compromise with the US Government on consumer privacy. MS, AOL-TW and IBM were all involved. I think it is called P3P and MS in it's solid citizen role is the first to implement it in a major product.
The idea is to allow the consumer to control the cookies on their own machine. Isn't that a radical idea?
Since I run a click-counting service, in time this will change how I operate. This is not a 'Microsoft' issue. It has been discussed for over a year. It is part of a larger set of issues that are seeking to curb eCommerce abuses.
The spammers and those guys that wanted to invade your privacy and track every site you visited are the cause for this cookie option.
| 1:46 am on Sep 6, 2001 (gmt 0)|
Here's the P3P site [w3.org]. I've been reading up on this today and found that the IE6 blocking is being triggered by sites that are delivering cookies from a third party -as network delivered ads would be done.
Cyril, couldn't you simply add the P3P 'certification' and continue tracking as-is?
| 6:34 am on Sep 6, 2001 (gmt 0)|
Though P3P addresses the cookie issue, what advertisers loose in cookies, they will more than make up in Web Beacons, something that is not covered under P3P. I recently downloaded a free utility called Bugnosis at www.bugnosis.org which highlights Web Beacons on a page. I was surprised at the amount that are on some pages. And even though they may not be able to track Personal Identifiable Information, they can track ISP info. Personally, I empty my Temporary Internet Files and Cache every time I close my browser, and some times when I switch from one web site to another. Hey, no on looks over my shoulder when I read a magazine. Well, no one should look over my shoulder when I'm surfing the web either. And Bugnosis only works with IE.
| 1:52 pm on Sep 6, 2001 (gmt 0)|
Hi Marshall, and welcome.
|For example, suppose Alice creates an account at Spend.com, which contains a Web bug to Bug.com. During this process she enters her e-mail address firstname.lastname@example.org. The Spend.com Web site could use a Web bug to transmit her address to Bug.com without Alice's knowledge. |
This bug now has attached this user's computer (with a cookie) to her email address, and knows where and when the person with that email address surfs. As cyril_kearney pointed out, this kind of thing is the real reason for this whole cookie blocking situation. (Not that all web beacons are used this way.)
>I empty my Temporary Internet Files and Cache
Do you also delete cookies?
| 2:48 pm on Sep 6, 2001 (gmt 0)|
> Do you also delete cookies?
Yes I do. Granted, I always have to re-enter my user name and password on those few sites I log in to - this for one, but it's a price I'm willing to pay. What gets me is why some cookies don't expire until 2030 or more. Who keeps a computer that long? And as for entering Email addresses, I have a slight advantage. I have unlimited Email accounts and open a specific one for each specific purpose so if I start getting Spam, not only do I know where it originated, I can shut down the account without affecting anything important.
| 2:20 pm on Sep 7, 2001 (gmt 0)|
The 1x1 transparent gifs that are being called webbugs are probably the most common way for advertisers to track usage on their site and their emails.
If you open your html email and one is present it might pass along the fact that you opened the email.
So somewhere in the email there will be an IMG statement for a 1x1 gif called something like viewed123.gif.
But lets go a little further if a banner is on the page and the banner is called, the viewed.gif is not necessary. The banner being served tells them you opened the email.
In a positive way an email advertiser can use this viewing information to prune his list. Those that don't open them for some period of time can be dropped from the email list.
Remember the guys selling stuff for Y2K. They did it by creating a 'clear and present' danger. Witch-hunting 1x1 gifs, in my opinion is much the same.