When the European Union’s General Data Protection Regulation (GDPR) went into effect in 2018, website owners were required to post a banner on their pages asking for permission to store cookies when a user first visited.
Although the cookie consent system is a great way to protect your privacy, seeing and interacting with the banner on every site you visit can be exhausting.
Vivaldi, a browser developer, revealed on Thursday that its latest “Cookie Crumbler” feature would remove all cookie dialogues and banners, allowing users to access websites without interruption.
These interruptions and blocks, which are often imposed before a user can access information, can easily cause users to select to allow without looking at the cookies they’re accepting.
The Cookie Crumbler functionality has been introduced to both the Android and desktop browsers by Vivaldi, and it is part of the current Ad and Tracker Blocker mechanism.
This means Vivaldi will begin treating banners like advertisements, blocking relevant page elements so users can see the content they want as soon as they arrive at a website.
On Android, go to Vivaldi Settings > Privacy > Enable Tracker and Ad blocking > Manage Sources > Ad blocking sources and turn on the “Remove cookie warnings” lists to enable Vivaldi’s Cookie Crumbler feature.
Users must go to Vivaldi’s menu > Settings > Privacy > Tracker and Ad blocking > Manage Sources > Ad blocking sources and then switch on the “Remove cookie alerts” lists to enable the feature on their device.
Blocking these banners, like many other ad and tracker blocker extensions, can break some websites, according to the company.
If users want to turn off the Cookie Crumbler, they must disable the Vivaldi Ad Blocker on these pages.
Meanwhile, the company warns that blocking a cookie consent dialogue on a website “does not have the same effect” as rejecting all of the site’s cookies.
However, disabling third-party cookies in your browser should resolve the issue.
Latest in Cybersecurity: Apple has patched a zero-day bug in macOS exploited by Shlayer malware