Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit ee62307

Browse files
authored
Update article.md
1 parent e2ac312 commit ee62307

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

‎6-data-storage/01-cookie/article.md‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ The cookie `samesite` option provides another way to protect from such attacks,
214214

215215
It has two possible values:
216216

217-
- **`samesite=strict` (same as `samesite` without value)**
217+
- **`samesite=strict`**
218218

219219
A cookie with `samesite=strict` is never sent if the user comes from outside the same site.
220220

@@ -230,7 +230,7 @@ When a user follows a legitimate link to `bank.com`, like from their own notes,
230230

231231
We could work around that by using two cookies: one for "general recognition", only for the purposes of saying: "Hello, John", and the other one for data-changing operations with `samesite=strict`. Then, a person coming from outside of the site will see a welcome, but payments must be initiated from the bank's website, for the second cookie to be sent.
232232

233-
- **`samesite=lax`**
233+
- **`samesite=lax` (same as `samesite` without value)**
234234

235235
A more relaxed approach that also protects from XSRF and doesn't break the user experience.
236236

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /