Skip to content

Commit ee62307

Browse files
authoredFeb 2, 2024
Update article.md
1 parent e2ac312 commit ee62307

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed
 

‎6-data-storage/01-cookie/article.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ The cookie `samesite` option provides another way to protect from such attacks,
214214

215215
It has two possible values:
216216

217-
- **`samesite=strict` (same as `samesite` without value)**
217+
- **`samesite=strict`**
218218

219219
A cookie with `samesite=strict` is never sent if the user comes from outside the same site.
220220

@@ -230,7 +230,7 @@ When a user follows a legitimate link to `bank.com`, like from their own notes,
230230

231231
We could work around that by using two cookies: one for "general recognition", only for the purposes of saying: "Hello, John", and the other one for data-changing operations with `samesite=strict`. Then, a person coming from outside of the site will see a welcome, but payments must be initiated from the bank's website, for the second cookie to be sent.
232232

233-
- **`samesite=lax`**
233+
- **`samesite=lax` (same as `samesite` without value)**
234234

235235
A more relaxed approach that also protects from XSRF and doesn't break the user experience.
236236

0 commit comments

Comments
 (0)
Failed to load comments.