Tool #154 · Privacy + HTTP Headers

Referrer-Policy Header Builder & Privacy Preview

Build a correct Referrer-Policy header, compare browser privacy tradeoffs, and preview what referrer data gets sent on same-origin, cross-origin, HTTPS, and downgrade requests.

1) Choose a policy

Pick a preset or inspect how each policy behaves before copying the final header or meta tag.

2) Simulate what gets sent

Use custom URLs to preview the exact referrer value that a browser would send under the selected policy.

    3) Copy outputs

    Header, HTML meta tag, and common server snippets are generated from the selected policy.

    Policy guidance

    A quick read on what your selection means operationally.

        Server & framework snippets

        Copy ready-to-use examples for deployment.

        When to use which policy

        Practical defaults for app teams, marketing sites, and strict privacy contexts.

        • Use strict-origin-when-cross-origin for most apps. It keeps full referrers on same-origin requests, sends only origins cross-site, and strips data on HTTPS → HTTP downgrades.
        • Use same-origin if you never want third parties to receive referrer details but still want internal analytics and routing context.
        • Use strict-origin when you still want cross-site origin-level attribution without leaking paths or query parameters anywhere.
        • Use no-referrer for highly sensitive products, internal tools, auth flows, or regulated environments where privacy beats attribution.
        • Avoid unsafe-url unless you explicitly accept leaking full URLs, including path and query data, to other origins over HTTPS.