A generic mechanism for measuring aggregate, cross-site data in a privacy preserving manner. The potentially identifying cross-site data is encapsulated into "aggregatable reports". To prevent leakage, this data is encrypted, ensuring it can only be processed by the aggregation service. During processing, this service will add noise and impose limits on how many queries can be performed.
Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
No
The proposal includes a temporary debugging mechanism to facilitate testing and integration. An internals page (chrome://private-aggregation-internals) is also available to view the status of pending and sent reports.
All but WebView
Reports sent through the API are subject to large delays and require overriding a public key endpoint. Some end-to-end tests are currently internal web tests. Where possible, tests are external and we are proposing new WebDriver APIs to support testing via web-platform-tests. Tests for the integration with Protected Audience are in-progress and should land soon.
A few changes to current behavior are expected including tying debug mode to third-party cookie eligibility (issue) and padding the encrypted payload (issue). Extensions to the API to support multiple aggregation services, enable Protected Audience report verification, and allow arrays of contributions (issue) are also expected and are purely additive. The JS interface for all of these changes will be backwards compatible with the current API.
Flag name
privacy-sandbox-ads-apisRequires code in //chrome?
FalseTracking bug
https://crbug.com/1316659Launch bug
https://crbug.com/1292756Estimated milestones
We intend to start an incremental ramp towards 100% in Stable starting with M115.Anticipated spec changes
A few changes to current behavior are expected including tying debug mode to third-party cookie eligibility (issue) and padding the encrypted payload (issue). Extensions to the API to support multiple aggregation services, enable Protected Audience report verification, and allow arrays of contributions (issue) are also expected and are purely additive. The JS interface for all of these changes will be backwards compatible with the current API.
Link to entry on the Chrome Platform Status
https://chromestatus.com/feature/5743412790689792Links to previous Intent discussions
Intent to prototype: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiFkKSt4YBNUn2h42G3z%2BqjwxjFAo%3DsPnrbvvOoNaDa_aAQ%40mail.gmail.com Intent to Experiment: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiF%3DKQYXEVn%3DB4rMabH14UdYyA%2BF8qQkWyUVPB0rypS1N0Q%40mail.gmail.comThis intent message was generated by Chrome Platform Status.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiFk4cb%2Bi69Symy-KCjHbtquGSQCn5scXy_YMSSWGut2vJw%40mail.gmail.com.
Are there others? Do you want to drive such issues to resolution (one way or the other) prior to shipping or make the case for why a breaking change will be doable (eg. a practical v2 migration strategy)?
----Link to entry on the Chrome Platform Status
https://chromestatus.com/feature/5743412790689792Links to previous Intent discussions
Intent to prototype: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiFkKSt4YBNUn2h42G3z%2BqjwxjFAo%3DsPnrbvvOoNaDa_aAQ%40mail.gmail.com Intent to Experiment: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiF%3DKQYXEVn%3DB4rMabH14UdYyA%2BF8qQkWyUVPB0rypS1N0Q%40mail.gmail.comThis intent message was generated by Chrome Platform Status.
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiFk4cb%2Bi69Symy-KCjHbtquGSQCn5scXy_YMSSWGut2vJw%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-OqR3nG8ghb0k2hGamf-76uVH%3DkYjhNGQi6mN84GjUzg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiF%3DAHzyktAiGjp_gbpj6aEiHdukRr%3DUfS5JGqzv3q8T%2Bcw%40mail.gmail.com.
I wanted to comment on this intent with my spec mentor hat on. I reviewed this specification and provided feedback to its authors.My main point of feedback was around its layering and how it relates to the other 2 specifications (Shared Storage and Protected Audience) that use the infrastructure that it defines. My feedback was properly addressed, and the specification was re-written such that it's unaware of its users, and its users are calling its algorithms, rather than the other way around.There's still work to be done to move the user algorithms from monkeypatch sections in this spec to their respective specifications, but I wouldn't consider that a blocker and I trust the team to do that soon.Beyond that, feedback around naming was addressed and I believe that ergonomics feedback can be addressed in a backwards compatible manner.As is, I believe the specification is in good shape to be implemented interoperably. I also believe the team is committed to improve it further on the (non-blocking) points that are still outstanding.
Flag name
privacy-sandbox-ads-apisRequires code in //chrome?
FalseTracking bug
https://crbug.com/1316659Launch bug
https://crbug.com/1292756Estimated milestones
We intend to start an incremental ramp towards 100% in Stable starting with M115.Anticipated spec changes
A few changes to current behavior are expected including tying debug mode to third-party cookie eligibility (issue) and padding the encrypted payload (issue). Extensions to the API to support multiple aggregation services, enable Protected Audience report verification, and allow arrays of contributions (issue) are also expected and are purely additive. The JS interface for all of these changes will be backwards compatible with the current API.
Thanks. Skimming the open issues I see at least one which sounds like it would be a non-trivial breaking change. Are there others? Do you want to drive such issues to resolution (one way or the other) prior to shipping or make the case for why a breaking change will be doable (eg. a practical v2 migration strategy)?
Flag name
privacy-sandbox-ads-apisRequires code in //chrome?
FalseTracking bug
https://crbug.com/1316659Launch bug
https://crbug.com/1292756Estimated milestones
We intend to start an incremental ramp towards 100% in Stable starting with M115.Anticipated spec changes
A few changes to current behavior are expected including tying debug mode to third-party cookie eligibility (issue) and padding the encrypted payload (issue). Extensions to the API to support multiple aggregation services, enable Protected Audience report verification, and allow arrays of contributions (issue) are also expected and are purely additive. The JS interface for all of these changes will be backwards compatible with the current API.
Thanks. Skimming the open issues I see at least one which sounds like it would be a non-trivial breaking change. Are there others? Do you want to drive such issues to resolution (one way or the other) prior to shipping or make the case for why a breaking change will be doable (eg. a practical v2 migration strategy)?Can you do a quick pass over open issues looking for any others with future compat risk (i.e. potential future breaking changes) and label them as such?
Flag name
privacy-sandbox-ads-apisRequires code in //chrome?
FalseTracking bug
https://crbug.com/1316659Launch bug
https://crbug.com/1292756Estimated milestones
We intend to start an incremental ramp towards 100% in Stable starting with M115.Anticipated spec changes
A few changes to current behavior are expected including tying debug mode to third-party cookie eligibility (issue) and padding the encrypted payload (issue). Extensions to the API to support multiple aggregation services, enable Protected Audience report verification, and allow arrays of contributions (issue) are also expected and are purely additive. The JS interface for all of these changes will be backwards compatible with the current API.
Thanks. Skimming the open issues I see at least one which sounds like it would be a non-trivial breaking change. Are there others? Do you want to drive such issues to resolution (one way or the other) prior to shipping or make the case for why a breaking change will be doable (eg. a practical v2 migration strategy)?Can you do a quick pass over open issues looking for any others with future compat risk (i.e. potential future breaking changes) and label them as such?Just did a pass and added labels. I've also added a brief comment to each issue marked "compat" with some detail on the risk/possible mitigations. Thanks!
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-m1k7ggckvAPCM%2Br1xbefkspOHhRf_O-a7b0LgDKOkqQ%40mail.gmail.com.
Flag name
privacy-sandbox-ads-apisRequires code in //chrome?
FalseTracking bug
https://crbug.com/1316659Launch bug
https://crbug.com/1292756Estimated milestones
We intend to start an incremental ramp towards 100% in Stable starting with M115.Anticipated spec changes
A few changes to current behavior are expected including tying debug mode to third-party cookie eligibility (issue) and padding the encrypted payload (issue). Extensions to the API to support multiple aggregation services, enable Protected Audience report verification, and allow arrays of contributions (issue) are also expected and are purely additive. The JS interface for all of these changes will be backwards compatible with the current API.
Thanks. Skimming the open issues I see at least one which sounds like it would be a non-trivial breaking change. Are there others? Do you want to drive such issues to resolution (one way or the other) prior to shipping or make the case for why a breaking change will be doable (eg. a practical v2 migration strategy)?Can you do a quick pass over open issues looking for any others with future compat risk (i.e. potential future breaking changes) and label them as such?Just did a pass and added labels. I've also added a brief comment to each issue marked "compat" with some detail on the risk/possible mitigations. Thanks!I reviewed the current state of all these and it looks pretty low-risk to me. Alex / Yoav, any decisions there you think this I2S should still be blocked on?
LGTM1
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA%2BBiFnqCQwMRYXyg844shcZ1XgFCnubyNm%2Bf4NFGJTmro0sJg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/7cbbe10d-5d1b-8e81-6d3a-9958ddc40460%40chromium.org.