Back to News
Advertisement
Advertisement

⚡ Community Insights

Discussion Sentiment

50% Positive

Analyzed from 529 words in the discussion.

Trending Topics

#query#strings#browser#don#legitimate#why#isn#apps#email#instead

Discussion (7 Comments)Read Original on HackerNews

chrismorgan•about 2 hours ago
I didn’t imagine that I would stir up quite so much interest when I decided to ban query strings!

When I said, “if it isn’t there, it’s prob­ably for a good reason”, I was fully aware of native apps, and decided to gloss over them, because I doubt (on no evidence) they’re so significant for me, and things like email and feed readers may well be web apps anyway. And because I’ve tended to fine nuance in the past, and am trying being concise instead.

While thinking about it—is it possible for a browser to know which app sent it the link, e.g. androidapp://com.example.app? Because that’d probably be a perfectly reasonable referrer, if a browser wanted to send it.

> Note that a handful of sites do choke on unex­pected query strings, including YouTube (!)

I want to learn more about this.

minebreaker•about 2 hours ago
I strongly disagree with a lot of claims here.

>> if it isn’t there, it’s probably for a good reason. > which isn’t really true anymore. For most websites, the majority — not just the plurality, but the majority — of visitors arrive by following a link inside an email or an app

I don't think the statement is factually backed up. At least I hate native apps.

> Even so, my custom query string is, in my calculation, an expression of digital etiquette: rather than dump a load of anonymous traffic on your doorstep, I reveal who’s linking, so a website or online shop operator can trace it back and get in touch, if wanted or needed

Anonymity considered harmful these days?

> a wave of new subscriptions and weren’t sure if they were legitimate; a brief email correspondence assured them that yes,

It's not legitimate unless it's signed (and if anybody gives a shit to verify it).

> Note that a handful of sites do choke on unexpected query strings, including YouTube (!),

This is a good habit IMHO.

Anyway, I'm thankful to the original post because it was a good reminder to re-review my browser settings.

Honestly I don't understand why the EU focused on the stupid cookie law instead of referers which are clearly privacy-violating.

If you use Firefox I recommend you make sure `network.http.referer.XOriginPolicy` set to 1.

intronic•about 1 hour ago
I also dont get why adding 'utm_source=Robin_Sloan_sent_me' somehow gels with his calculation it is 'an expression of digital etiquette: rather than dump a load of anonymous traffic on your doorstep, I reveal who’s linking'. Theres no actual link to the referring website just some bunch of characters which look like someones name and some of which are in the actual referring URL.

And yeah I'm also thankful also to see that firefox setting.

jampekka•4 minutes ago
> Honestly I don't understand why the EU focused on the stupid cookie law instead of referers which are clearly privacy-violating.

Neither the ePrivacy directive (commonly called the "cookie law") or the later GDPR focus on cookies. They are "technology neutral", applying to e.g. URL parameters and HTTP headers too, but just widely misunderstood and badly enforced.

thayne•about 1 hour ago
I get adding query strings on links to your own domain, but from the original post, it sounds like the author was seeing third parties add query strings to links to their domain and I don't see what the point in doing that is, unless the entity adding those quey parameters is able to somehow intercept them between the browser and the website (which is possible if they control the browser or a cdn).
akersten•about 2 hours ago
i'm confused, why would you go out of your way to add this tracking info to external links voluntarily? it doesn't benefit you, it just helps other websites segment their traffic?
kijin•about 3 hours ago
If there's a query parameter that you have a legitimate use for, like `q` for searching, obviously you should configure your web server to let it through.

Even in that case, you might want to block unexpected values as early as possible in your stack. For example, if you have a legitimate use for a certain set of `utm_source` values, but someone sends you bobby tables, you probably shouldn't log it blindly.

Ditto for the Referer header -- there's a lot of spam, and some of those strings might even be dangerous. You can't trust any of them anymore.