Wednesday, April 9, 2025
Homecyber securityWorld Wide Web Consortium Opposed Google’s Decision on Third-party cookies

World Wide Web Consortium Opposed Google’s Decision on Third-party cookies

Published on

SIEM as a Service

Follow Us on Google News

The World Wide Web Consortium (W3C) has strongly opposed Google’s decision to halt the deprecation of third-party cookies. The W3C has updated its Technical Architecture Group (TAG) finding to emphasize the necessity of removing third-party cookies due to their inherent privacy issues.

The consortium argues that these cookies enable tracking across multiple websites, which can lead to significant privacy breaches and unwanted surveillance.

Privacy Concerns and Societal Impact

The W3C’s updated stance aligns with concerns raised by various regulatory authorities and privacy organizations.

- Advertisement - Google News

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

According to the consortium, third-party cookies facilitate the invisible tracking of users’ browsing activities, which can be exploited for ad targeting and surveillance. This hidden data collection undermines user privacy and can support the micro-targeting of political messages, potentially impacting societal dynamics.

Privacy International and other organizations have highlighted these issues, and regulatory bodies like the UK’s Information Commissioner’s Office have called for blocking third-party cookies.

Collaborative Efforts and Future Implications

The W3C has been collaborating with Google’s Chrome Privacy Sandbox team and other members of the W3C community to develop alternatives to third-party cookies.

Despite significant progress, Google’s recent announcement has come as a surprise, undermining the collaborative efforts to enhance web privacy.

The W3C fears that this decision will delay the development of effective cross-browser alternatives and negatively impact the broader goal of improving web privacy.

The consortium urges Google to reconsider its stance and re-commit to removing third-party cookies.

The W3C remains committed to its mission of improving the web and will continue to work with all stakeholders to achieve this goal. The consortium hopes that all browsers and user agents will collaborate to enhance web privacy and user experience.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...