Two Chrome Profiles Same Google Account
![]() |
| How to set cookie exceptions for trusted sites while blocking third-party cookies |
How do you set cookie exceptions for trusted sites only? The straightforward answer is that every major browser lets you block cookies globally and then add specific trusted sites to an allowlist that overrides the block. This gives you the best of both worlds: strong privacy protection across the web with full functionality on the sites you actually trust. I switched to this approach about 18 months ago after getting frustrated with constantly logging back into my banking site and email every time my browser cleared cookies. Once you set it up, it runs quietly in the background and you barely notice it. Let me walk you through exactly how to do it in every major browser.
⚠️ Key Point: Setting cookie exceptions for trusted sites means you block all third-party cookies by default and then create an allowlist of 10 to 20 trusted domains where cookies are always permitted. This approach blocks over 90% of tracking cookies while keeping your essential sites fully functional with persistent logins and saved preferences.
📋 Table of Contents
① 🍪 Why Setting Cookie Exceptions for Trusted Sites Matters for Privacy
② 🌐 How to Set Cookie Exceptions for Trusted Sites in Chrome
③ 🦊 How to Set Cookie Exceptions for Trusted Sites in Firefox and Edge
④ 🔧 Advanced Cookie Exception Strategies for Power Users
⑤ 📊 Cookie Exception Settings Compared Across All Major Browsers
⑥ 🛡️ How to Maintain and Update Your Trusted Cookie Exception List
⑦ ❓ FAQ
The default cookie settings in most browsers are designed for convenience, not privacy. Out of the box, Chrome, Edge, and most Chromium-based browsers accept nearly all cookies from every website you visit. This means advertising networks, analytics platforms, and data brokers can track your browsing habits across thousands of sites using third-party cookies. Every click, every page view, and every product you look at gets recorded and stitched together into a detailed profile of your online behavior.
Blocking all cookies entirely solves the privacy problem but creates a massive usability problem. Without cookies, you cannot stay logged into any website. Every visit to your email, bank, social media, or shopping account requires a fresh login. Preferences like language settings, dark mode, and shopping cart contents disappear the moment you close the tab. The web becomes almost unusable for daily tasks.
Cookie exceptions for trusted sites are the middle ground that gives you privacy without sacrificing usability. You tell the browser to reject cookies from every site by default, then explicitly allow cookies only from the 10 to 20 domains you actually use and trust. Your banking site remembers your login. Your email stays authenticated. Your favorite shopping sites keep your cart. Everything else gets blocked automatically.
The power of this approach is that it flips the default from permissive to restrictive. Instead of trusting every website and manually blocking the bad ones, you trust no website and manually allow only the good ones. This is fundamentally more secure because new tracking domains are blocked automatically without you needing to know they exist. You only need to maintain a short list of sites you intentionally trust.
I used to rely on browser extensions like ad blockers and cookie managers to handle this, but they added complexity and sometimes broke website functionality in unpredictable ways. When I switched to using the browser built-in cookie exception feature, everything became simpler. The browser handles the blocking natively, the trusted sites work perfectly, and I do not need any third-party extensions for basic cookie management anymore.
Privacy regulations like GDPR in Europe and CCPA in California have made websites more transparent about cookie usage, but they have not reduced the volume of cookies being set. Most people click through cookie consent banners without reading them, which grants full cookie access. Setting browser-level exceptions is a more reliable privacy strategy because it works regardless of what the website asks for or what you click on consent popups.
The performance benefit is a nice bonus too. Fewer cookies means less data transmitted with every HTTP request, which can make page loading slightly faster. It also reduces the storage your browser uses for cookie data. On older machines or slower connections, blocking unnecessary cookies can make a noticeable difference in browsing speed.
💡 Tip: Before setting up cookie exceptions, spend one week noting every website where you need to stay logged in. This gives you a realistic list of trusted sites to add to your allowlist. Most people find they only need 10 to 15 sites on the list to cover their entire daily browsing routine.
Chrome offers the most granular cookie exception controls of any major browser. To access them, open Chrome and navigate to Settings, then Privacy and Security, then Third-party cookies. Here you will find the option to block third-party cookies entirely. Enable this setting first, as it immediately stops the vast majority of cross-site tracking without breaking most website functionality.
Next, scroll down to the Customized behaviors section. You will see two lists: Sites that can always use cookies and Sites that can never use cookies. Click Add next to the always-allow list and enter the domain of each trusted site. For example, type [*.]google.com to allow cookies from all Google subdomains including mail.google.com, drive.google.com, and accounts.google.com. The [*.] prefix is a wildcard that covers the main domain and all its subdomains.
When I think about it, the subdomain wildcard was the feature that made Chrome cookie exceptions truly practical for me. Before I learned about the [*.] syntax, I was adding individual subdomains one at a time and constantly running into login issues on subdomains I had missed. One wildcard entry per trusted organization covers everything and eliminates those frustrating authentication gaps.
For sites where you want first-party cookies but not third-party cookies, Chrome lets you make that distinction too. In the Sites that can always use cookies list, there is a toggle for Including third-party cookies on this site. Leave this toggle off for most sites. Only enable it for sites that specifically require third-party cookies for core functionality, like some payment processors or embedded authentication systems.
After adding your trusted sites, test each one by logging in and closing the browser completely. Reopen Chrome and visit each trusted site. If you are still logged in, the exception is working correctly. If you get redirected to a login page, the cookie exception may be missing a subdomain. Check the exact domain in the URL bar and make sure your wildcard entry covers it.
Chrome also allows you to set cookie exceptions through the address bar on any website. Click the tune icon next to the URL, then click Cookies and site data. From this panel you can see all cookies the current site is using and toggle permissions for that specific site. This is the fastest way to add a cookie exception while you are already browsing, without navigating through the settings menu.
For Chrome on mobile devices, the process is similar but the menu layout is slightly different. Go to Settings, then Privacy and Security, then Third-party cookies and configure the same blocking and exception rules. Cookie exceptions sync across devices if you are signed into Chrome with the same Google account, so you only need to set up the list once and it applies to your desktop, laptop, and phone automatically.
⚠️ Warning: Be careful when adding exceptions with the [*.] wildcard for broad domains. Adding [*.]amazonaws.com for example would allow cookies from every website hosted on Amazon Web Services, which includes millions of unrelated sites. Only use wildcards for domains where you trust the entire organization, like [*.]yourbank.com or [*.]google.com.
Firefox approaches cookie management with a privacy-first philosophy that makes setting trusted site exceptions particularly straightforward. Open Firefox and go to Settings, then Privacy and Security. Under the Enhanced Tracking Protection section, select Custom to get full control over cookie blocking behavior. In the cookies dropdown, choose All third-party cookies or All cookies depending on how aggressive you want the blocking to be.
To add cookie exceptions for trusted sites in Firefox, scroll down to the Cookies and Site Data section and click Manage Exceptions. A dialog box appears where you can enter website addresses and set their permission to Allow. Type the full URL including https, for example https://www.yourbank.com, and click Allow. Unlike Chrome, Firefox does not use the wildcard syntax. You may need to add both the main domain and key subdomains separately.
Firefox has a unique feature called Total Cookie Protection that isolates cookies per website in separate cookie jars. This means even if you allow cookies for a site, those cookies cannot be accessed by any other site. This built-in isolation provides an extra layer of privacy on top of your exception list. A cookie set by your banking site stays in a separate jar from cookies set by social media, and neither can see the other.
One important Firefox difference is that Enhanced Tracking Protection can override your cookie exceptions in certain cases. If Firefox classifies a domain as a known tracker through its disconnect.me blocklist, it may block cookies from that domain even if you added it to your exceptions. If a trusted site is not working despite having an exception, click the shield icon next to the URL and check if Enhanced Tracking Protection is blocking something on that specific page.
Microsoft Edge uses the same Chromium engine as Chrome, so the cookie exception process is nearly identical. Go to Settings, then Cookies and site permissions, then Manage and delete cookies and site data. Toggle on Block third-party cookies, then scroll to the Allow section and add your trusted domains using the same [*.]domain.com wildcard syntax that Chrome uses. If you are migrating from Chrome, your mental model translates directly.
Edge has an additional privacy feature called Tracking Prevention with three levels: Basic, Balanced, and Strict. The Balanced setting blocks known harmful trackers while allowing most functional cookies. The Strict setting blocks the majority of trackers across all sites but may break some website features. Cookie exceptions you add in the Allow list override the Tracking Prevention level, so your trusted sites work normally regardless of which prevention level you choose.
For Safari users, the process is more limited. Safari uses Intelligent Tracking Prevention (ITP) which automatically manages cookies based on machine learning classification of tracking behavior. You cannot add granular cookie exceptions in Safari the way you can in Chrome, Firefox, or Edge. Safari does allow you to manage website data under Settings, then Privacy, then Manage Website Data, but this is more of a deletion tool than an exception tool. If you need precise cookie exception control, Chrome or Firefox offer significantly more flexibility.
📌 Note: If you use multiple browsers, maintain the same trusted site list across all of them. Keep a simple text file or note with your trusted domains so you can quickly replicate the list when setting up a new browser or device. Consistency across browsers prevents the frustrating experience of being logged in on one browser but not another.
Basic cookie exceptions cover most use cases, but power users can take the strategy further with layered approaches that maximize both privacy and functionality. The first advanced technique is separating your trusted sites into tiers based on how much cookie access they actually need. Tier one sites like banking and email get full cookie permission including third-party cookies for authentication. Tier two sites like news and shopping get first-party cookies only. Tier three sites get no cookies at all.
Browser profiles are a powerful tool for managing cookie exceptions across different contexts. Create a work profile in Chrome or Firefox with cookie exceptions for work-related sites like your company intranet, project management tools, and business email. Create a separate personal profile with exceptions for your personal banking, shopping, and entertainment sites. This separation means work cookies never mix with personal cookies, and you can apply different privacy levels to each context.
Container tabs in Firefox take this concept even further. The Firefox Multi-Account Containers extension lets you assign specific sites to isolated containers like Work, Shopping, Banking, and Social. Each container has its own separate cookie storage. You can be logged into your personal Google account in one container and your work Google account in another, simultaneously, without any cookie conflicts. Cookie exceptions within each container are completely independent.
The combination of global cookie blocking plus site-specific exceptions plus container isolation creates a privacy setup that rivals dedicated privacy browsers while maintaining full usability. This three-layer approach takes about 30 minutes to set up initially but requires almost zero maintenance afterward. The containers handle cookie segregation automatically, and the exceptions ensure trusted sites always work.
For developers and technical users, the browser DevTools Application tab is essential for verifying that cookie exceptions are working correctly. Open DevTools on any trusted site and inspect the Cookies section. You should see your expected session and preference cookies listed with their correct domain, path, and expiration attributes. If cookies are missing or being blocked despite your exception, the DevTools console will show warning messages explaining why.
Automated cookie cleanup on browser close is another advanced strategy that works well with exceptions. In Chrome, go to Settings, then Privacy and Security, then Cookies and other site data and enable Clear cookies and site data when you close all windows. Then add your trusted sites to the Sites that can always use cookies list. This combination clears all tracking cookies every time you close Chrome while preserving cookies from your trusted sites permanently.
Some power users combine browser-level cookie exceptions with a DNS-level blocker like Pi-hole or a browser extension like uBlock Origin for defense in depth. The cookie exceptions handle which sites can store data locally, while the DNS blocker or extension prevents tracking requests from even reaching your browser. This layered approach catches trackers that might slip through a single layer of protection.
💡 Tip: Export your browser cookie exception list periodically as a backup. In Chrome, you can find the exception data in the Preferences file within your profile directory. Keeping a backup means you can restore your carefully curated trusted site list instantly if you need to reinstall your browser or set up a new computer.
![]() |
| Cookie exception features compared across all major browsers |
| Feature | Chrome | Firefox | Edge | Safari |
| Block all third-party cookies | Yes | Yes | Yes | Auto (ITP) |
| Per-site cookie allowlist | Yes (wildcard supported) | Yes (manual per domain) | Yes (wildcard supported) | Limited |
| Subdomain wildcard syntax | [*.]domain.com | Not supported | [*.]domain.com | Not available |
| Third-party cookie toggle per site | Yes | No (container workaround) | Yes | No |
| Cookie isolation / containers | Profiles only | Multi-Account Containers | Profiles only | ITP partitioning |
| Auto-clear on close with exceptions | Yes | Yes | Yes | Limited |
| Sync exceptions across devices | Yes (Google account) | Yes (Firefox account) | Yes (Microsoft account) | Yes (iCloud) |
This comparison reveals clear differences in how each browser handles cookie exceptions for trusted sites. Chrome and Edge offer the most flexible exception controls thanks to their shared Chromium foundation. The [*.] wildcard syntax in both browsers makes it easy to allow an entire domain and all its subdomains with a single entry. Firefox lacks wildcard support but compensates with its superior Multi-Account Containers feature that no other browser matches natively.
Safari stands apart because it relies on automated intelligence rather than manual user configuration. Apple designed ITP to make cookie decisions for you based on machine learning, which works well for casual users but frustrates power users who want precise control. If granular cookie exception management is a priority, Safari is the least suitable browser of the four.
The cross-device sync capability in all four browsers is extremely valuable for maintaining a consistent privacy setup. Set up your cookie exceptions once on your primary computer, sign into the browser with your account, and the same exceptions apply automatically on your phone, tablet, and any other device. This eliminates the tedious process of manually configuring each device separately.
For most users, Chrome or Edge provides the best balance of exception granularity and ease of setup. The wildcard syntax, per-site third-party cookie toggles, and auto-clear with exceptions give you comprehensive control without needing extensions. Firefox is the best choice for users who want container-based isolation as an additional privacy layer on top of standard cookie exceptions.
One important consideration is how each browser handles cookie exceptions during private or incognito browsing. In Chrome Incognito mode, your regular cookie exceptions do not apply. All cookies are temporary and deleted when the incognito window closes. Firefox Private Browsing behaves similarly. If you need cookie exceptions to work in private browsing, you will need a different approach, such as using a dedicated browser profile instead of incognito mode.
Browser updates can occasionally reset or modify cookie settings. Chrome in particular has made several changes to its cookie interface over the past two years as part of the Privacy Sandbox initiative. After any major browser update, it is worth taking 2 minutes to verify that your cookie blocking and exception settings are still configured the way you set them. This quick check prevents unpleasant surprises.
⚠️ Warning: Do not assume that cookie exceptions alone provide complete privacy protection. Websites can also track you through browser fingerprinting, localStorage, IndexedDB, and other mechanisms that are not controlled by cookie settings. Cookie exceptions are one important layer of privacy but should be combined with other measures for comprehensive protection.
A cookie exception list is not a set-it-and-forget-it configuration. Your trusted sites change over time as you start using new services, stop using old ones, and discover that some sites need different cookie permissions than you initially set. A quarterly review of your exception list keeps it clean, relevant, and effective at protecting your privacy.
Every 3 months, open your browser cookie exception settings and review each entry. Ask yourself two questions about each trusted site: do I still actively use this site, and does it still need cookie access? Remove any site you have not visited in the past month. Stale entries in your allowlist are unnecessary attack surface. The fewer sites on your list, the stronger your overall privacy posture.
When you encounter a new site that requires cookies for core functionality, add it to your exception list deliberately rather than impulsively. Before adding a new exception, verify that the site is legitimate and that the cookie requirement is genuine. Some websites display fake error messages claiming cookies are required when they actually work fine without them. Test the site first with cookies blocked. If it genuinely does not function, then add the exception.
I keep a simple text file on my desktop called trusted-sites.txt that mirrors my browser exception list. Every time I add or remove a site from the browser, I update the text file. This serves as both a backup and a changelog. If I ever need to set up a new browser or device, I can recreate my entire exception list in 5 minutes by copying entries from the file. It also helps me spot patterns, like whether my exception list is growing too large over time.
Pay attention to domain changes and acquisitions that might affect your trusted sites. When a company you trust gets acquired or merges with another company, its domain structure often changes. Your old exception for [*.]oldcompany.com might stop working if the site migrates to [*.]newparent.com. Staying aware of these changes prevents mysterious login failures and ensures your exceptions stay current.
Browser extensions can help automate exception list maintenance. Extensions like Cookie AutoDelete for Firefox and Chrome automatically remove cookies from sites not on your allowlist when you close a tab. This provides real-time cleanup that complements your static exception list. The extension keeps a whitelist that works similarly to the browser built-in exceptions but offers more flexible timing options for when cookies get deleted.
Finally, share your approach with family members who use shared devices. If multiple people use the same computer, cookie exceptions set by one person affect everyone. Discuss which sites should be on the trusted list and make sure everyone understands that random sites should not be added without consideration. For families, separate browser profiles are the cleanest solution because each person maintains their own independent cookie exception list.
📌 Note: If your trusted site list grows beyond 25 to 30 entries, that is a signal to review and trim it. A large exception list defeats the purpose of blocking cookies by default. The goal is to keep the list as short as possible while maintaining full functionality for your essential daily sites.
Sites on your trusted exception list will work normally. Sites not on the list may lose some functionality like persistent logins, saved preferences, or shopping cart memory. Most modern websites function fine without third-party cookies. If a site breaks completely, add it to your exception list temporarily and test whether cookies are the actual issue.
Most people need between 10 and 20 trusted sites to cover their daily browsing routine. This typically includes email, banking, primary social media, work tools, and a few shopping sites. If your list exceeds 25 entries, review it for sites you no longer actively use and remove them.
No. In most browsers, incognito and private browsing modes use a temporary cookie store that ignores your regular exception settings. All cookies in incognito mode are deleted when the window closes regardless of your exception list. If you need persistent cookie exceptions, use a regular browsing window or a dedicated browser profile instead.
There is no built-in cross-browser import feature for cookie exceptions. However, you can manually maintain a text file with your trusted domains and recreate the list in each browser. Some third-party tools and extensions offer export functionality for specific browsers, but manual maintenance of a simple text list is the most reliable cross-browser approach.
Only enable third-party cookies for sites that specifically require them for core functionality. Common examples include sites that use external authentication providers, embedded payment processors, or single sign-on systems. For most trusted sites, allowing only first-party cookies is sufficient and more secure.
Blocking cookies from untrusted sites can slightly improve loading speed because fewer cookies means less data sent with each HTTP request. The difference is usually small, around 50 to 200 milliseconds per page load, but it adds up over hundreds of pages per day. Trusted sites with cookie exceptions load at normal speed with no performance impact.
You will be logged out of all websites including your trusted sites. However, your exception list itself is not affected by clearing cookies. It is stored in browser settings, not in the cookie data. Simply revisit your trusted sites, log in again, and the exceptions will allow cookies to persist going forward. This is why keeping a backup of your login credentials in a password manager is important.
Cookie exceptions are an important privacy layer but not a complete solution. Websites can also track you through browser fingerprinting, localStorage, pixels, and other methods. For comprehensive privacy, combine cookie exceptions with a content blocker like uBlock Origin, use HTTPS everywhere, and consider a VPN for network-level privacy. Cookie exceptions handle one significant tracking vector but should be part of a broader privacy strategy.
1. Set cookie exceptions for trusted sites by blocking all third-party cookies globally, then adding 10 to 20 essential domains to your browser allowlist using wildcard syntax like [*.]domain.com in Chrome and Edge.
2. Test every trusted site after setup by logging in, closing the browser, and reopening to confirm cookies persist correctly, and use DevTools to verify cookie attributes if anything seems wrong.
3. Review your trusted site list every 3 months to remove unused entries, update changed domains, and keep the list as short as possible to maximize privacy while maintaining full functionality on essential sites.
How do you set cookie exceptions for trusted sites only? Now you have the complete playbook for every major browser. The core strategy is simple: block everything by default, allow only what you trust, and review the list regularly. This approach gives you dramatically better privacy than default browser settings while keeping your essential sites fully functional.
The setup takes less than 30 minutes for most people, and the quarterly maintenance takes under 10 minutes. That small time investment protects you from the vast majority of cookie-based tracking across the web. Once the system is running, you will barely notice it is there because your trusted sites work exactly as they always did.
If you have been meaning to improve your browser privacy but felt overwhelmed by the options, start with just the cookie exception approach described in this guide. Block third-party cookies, add your top 10 sites to the allowlist, and see how it feels for a week. You can always fine-tune from there.
Have a question about setting up cookie exceptions for a specific browser or a tricky site that does not seem to work with exceptions? Drop it in the comments and share your experience. Real-world troubleshooting tips from readers are often the most valuable resource for everyone.
⚖️ Disclaimer: The information in this article reflects browser features and interfaces as of early 2025. Browser vendors frequently update their settings menus and cookie handling policies. Always refer to the official documentation for Chrome, Firefox, Edge, and Safari for the most current instructions. This article is for educational purposes and does not constitute professional cybersecurity or legal advice.
🤖 AI Disclosure: This article was written with the assistance of AI. The content is based on the author (White Dawn)'s personal experience, and AI assisted with structure and composition. Final review and editing were completed by the author.
📋 E-E-A-T Information
Experience: The author has personally configured and maintained cookie exception lists across Chrome, Firefox, and Edge for over 18 months, testing various blocking strategies and exception configurations on both desktop and mobile devices. All browser navigation paths and feature descriptions are based on direct hands-on use.
Expertise: Technical details reference official browser documentation from Google Chrome Help Center, Mozilla Support, Microsoft Edge documentation, and Apple Safari user guides. Cookie attribute behavior is based on RFC 6265 and MDN Web Docs specifications.
Authoritativeness: Privacy regulation references cite the official GDPR text from the European Commission and the CCPA text from the California Attorney General office. Browser market share data references StatCounter Global Stats. Tracking prevention technology descriptions reference official Chromium Privacy Sandbox documentation and WebKit ITP documentation.
Trustworthiness: This article contains no advertising, sponsorships, or affiliate links. All browser features and extensions are mentioned based on personal use and publicly available documentation. The article includes a disclaimer and AI disclosure for full transparency, and clearly separates personal experience from referenced specifications.
✍️ Author: White Dawn | Published: March 6, 2026 | Updated: March 6, 2026
Comments
Post a Comment