This page outlines some best practices for setting your Referrer-Policy and using the referrer in incoming requests. Summary Unexpected cross-origin information leakage damages web users' privacy. A protective referrer policy can help. Consider setting a referrer policy of strict-origin-when-cross-origin. It preserves most of the referrer's usefulness, while mitigating the risk of leaking data cro