Sunday, March 2, 2025
Homecyber securityWorld Wide Web Consortium Opposed Google’s Decision on Third-party cookies

World Wide Web Consortium Opposed Google’s Decision on Third-party cookies

Published on

SIEM as a Service

Follow Us on Google News

The World Wide Web Consortium (W3C) has strongly opposed Google’s decision to halt the deprecation of third-party cookies. The W3C has updated its Technical Architecture Group (TAG) finding to emphasize the necessity of removing third-party cookies due to their inherent privacy issues.

The consortium argues that these cookies enable tracking across multiple websites, which can lead to significant privacy breaches and unwanted surveillance.

Privacy Concerns and Societal Impact

The W3C’s updated stance aligns with concerns raised by various regulatory authorities and privacy organizations.

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

According to the consortium, third-party cookies facilitate the invisible tracking of users’ browsing activities, which can be exploited for ad targeting and surveillance. This hidden data collection undermines user privacy and can support the micro-targeting of political messages, potentially impacting societal dynamics.

Privacy International and other organizations have highlighted these issues, and regulatory bodies like the UK’s Information Commissioner’s Office have called for blocking third-party cookies.

Collaborative Efforts and Future Implications

The W3C has been collaborating with Google’s Chrome Privacy Sandbox team and other members of the W3C community to develop alternatives to third-party cookies.

Despite significant progress, Google’s recent announcement has come as a surprise, undermining the collaborative efforts to enhance web privacy.

The W3C fears that this decision will delay the development of effective cross-browser alternatives and negatively impact the broader goal of improving web privacy.

The consortium urges Google to reconsider its stance and re-commit to removing third-party cookies.

The W3C remains committed to its mission of improving the web and will continue to work with all stakeholders to achieve this goal. The consortium hopes that all browsers and user agents will collaborate to enhance web privacy and user experience.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...