-
Notifications
You must be signed in to change notification settings - Fork 505
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
discussion: section persistent [web] storage items #235
Comments
NOTE: C-AD is Cookie AutoDelete (a webextension). |
Those persistent cookie are typically stored in IndexedDB, which can be effectively cleaned by Cookies Exterminator addon. |
Sure... I have mention the working solution at this point for anyone interested (IMHO it is worth to mention) and elaborated further in the "Note" section of my response. Now I will hide my head in the sand. ;) |
the example site weather.com uses IDB and the 5. step in his steps to reproduce is "Go to weather.com again and wait a little bit." - "wait a little bit" most likely because it restores the locations from the IDB and stores it in LocalStorage again. Local Storage is most definitely cleared by clearing recent history (cookies is enough actually) - you can check the webappsstore.sqlite file if you don't believe me. |
yeah sorry about that. Sure, I am not against that but with all these issues at the moment maybe it would be better to wait for a while. Otherwise there would need to be a lot of text and it could easily end up being way too confusing. |
A persistent "storage and memory" section is a good idea. |
Concerning LocalStorage I read here the developer of the Firefox Cookie Controller add-on state:
The setting for this is 1- I'd like to know your opinion regarding the fact web pages don't always handle overflowing this quota very well.
the following setting:
Of course it's possible to use a dedicated add-on (or even as I used to, a dedicated Custom Button) but this requires a per-site user intervention since Firefox doesn't handle this on per-site. On another hand setting |
Yeah, the IndexedDB odyssey, the fact of visiting a site such as bostonglobe.com with cookies set to site and session only and notice in the Page Info / Permissions / Maintain Offline Storage filled with 48kB of data, removing it and blocking the site, reopening the site to notice the 48kB are back: yeps I experienced that as we all. Ghacks has a dedicated article on this. I managed a work-around by associating two add-ons : Permit Cookie 2 (legacy add-on) and Cookie Autodelete. I've uninstalled Self-Destructing Cookies add-on not because it is a legacy add-on but because Cookie Autodelete being a Webextension it will run its cookie management database seperately, and that can be an advantage: I've set
All this rather than only Cookie Autodelete only because whatever site, if cookies are not blocked (blocked for that site anyway) are at this time enabled to lay their data in my profile / storage folder, and I refuse that. The LocalStorage is less problematic in that the storage will be persistent only if the site is allowed to use a persistent cookie. In my scheme I face a site laying IndexedDB data in my storage folder only if I've set a cookie exception (session or persistent) and that the site is an IndexedDB aficionado. Not to mention that blocking all cookies with exceptions is a pleasure when visiting sites that install cookies for no valid reason, and even edit them live as bostonglobe.com does : listen, I still use an add-on called 'Noise' and it includes two Event topics (via addObserver), the cookie-rejected and cookie-changed events : I check these two events for testing, visit a site such as bostonglobe and hear the cookie(s) modified as I scroll! The site is actually updating live its cookieon every line I scroll!. So, altogether, this combination of two add-ons, one (legacy) handling cookie exceptions on Firefox's level, the other, Webextension, handling cookies' exceptions within its own database, allows to fine tune cookies and therefore storage, globally since all seems to depend of the cookies behavior permission. That's how I do it until Mozilla gets things in order. |
I've been experiencing with:
Quite nice. Many sites block with For whome may be interested to know what Local and Session storage is used by a site, there's the localStorage inspector bookmarklet which delivers that information flawlessly. Indeed, as mentioned in the user.js concerning
but the point is, if controlling with an extension (or with a dedicated Custom Button as I do) the dom storage feature, switching |
Just FYI With user_pref("dom.storage.default_quota", 0); videos on imdb.com does not work. |
I am considering Example:
Of course it would be as an aberration to set the quota to 0 for everywhere as it is to set the dom storage to disabled ... unless granular control is made available. |
My point is to replace what was performed with the Self-Destructing Cookies legacy add-on but not handled by a Webextension : remove what has been set in the users localStorage once the site is closed, as performed with non whitelisted cookies. Cookies is easy, the Cookie Autodelete webextension does it, but doesn't handle the localStorage. Nothing complicated in fact, unless to consider that the aim of clearing DOM storage set by a site is excessive given that DOM storage won't be readable by a 3rd-party site if 3rd-cookies are forbidden, that sessionStorage vanishes and that localStorage is persistent only if a site has been set in the user's cookie whitelist. My aim is to have the DOM storage set by a site cleared once the site is closed. The aim is arguable but the way to achieve it (now that Webextensions cannot) seems to me interesting, and I happened to believe that squeezing privacy concerns was the very lot of our common concern here. |
This is just observation notice, I am using default. ;) |
I deny cookies as well ( Concerning DOM storage looks like I've mistaked, indeed. No point in emphasizing on a no-problem. |
section 2700 will get a revamp, so not worried about numbering for now. Slight header tweak until we revamp
snip
The text was updated successfully, but these errors were encountered: