shiva...@chromium.org, geor...@google.com
https://github.com/privacysandbox/attestation/blob/main/README.md
Design document
https://docs.google.com/document/d/16PYa6wBBGBbV4YMujkFzBab8s4a7N4PcvpY0Js1qN1k/edit?usp=sharing
While the enrollment process itself is not intended to be standardized, the impacted API specifications allow for a user agent defined gating mechanism such as enrollment and attestation. The spec changes for the gated APIs are linked below:
Private aggregation (section with note on enrollment)
Shared Storage (pull request)
Topics (pull request)
Attribution reporting API (pull request)
Protected Audience (pull requests: 1, 2)
As the Privacy Sandbox relevance and measurement APIs start ramping up for general availability, we want to make sure these technologies are used as intended and with transparency. The APIs include Attribution Reporting, the Protected Audience API, Topics, Private Aggregation and Shared Storage. As announced in a blog post, a new Developer Enrollment process for Privacy Sandbox relevance and measurement APIs is being introduced across Chrome and Android. This I2S refers to Chrome’s implementation of fetching the enrolled-sites list from the enrollment server (via component updater) and using it to gate access to the Privacy Sandbox APIs.
Internals > AttributionReporting
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Supported on all the above platforms except Android WebView.
In the initial version, no gated APIs are supported on WebView , with the caveat that the Attribution Reporting API delegates from WebView to Android and would be gated as part of Android’s attestation based gating.
Debuggability
Local override: For local testing, we are providing developer overrides with a Chrome flag and CLI switch:
Flag: chrome://flags/#privacy-sandbox-enrollment-overrides
CLI: --privacy-sandbox-enrollment-overrides=https://example.com,https://example.co.uk,...
https://github.com/privacysandbox/attestation/blob/main/README.md
Private Aggregation (comment)
Shared Storage (comment)
Topics (comment)
Attribution reporting API (comment)
Protected Audience (comment)
Initially the enrolled and attested sites list will only be available to Chrome browsers. The list is publicly available in the sense that it's shipped to Chrome browsers, but we don't have an official site currently where we post it. However, we could potentially do so in the future and that would enable other browsers to have a consistent gating mechanism.
No compatibility concerns. The existing APIs either return promises, and will reject for callers that are not enrolled (and they can already reject for other reasons today), or they don’t return anything and the script will not break.
No, as there are no plans to standardize this behavior.
https://launch.corp.google.com/launch/4260778
M118
Links to previous Intent discussions
Intent to prototype: https://groups.google.com/a/chromium.org/g/blink-dev/c/Zy6uyaTdcJ8
Hi Shivani,
In general I think this is a pretty interesting idea, just a few
minor questions below:
Contact emails
shiva...@chromium.org, geor...@google.com
Explainer
https://github.com/privacysandbox/attestation/blob/main/README.md
A few questions about the attestation format:
1) expiry_seconds_since_epoch implies this expires. Is there any more info on this? Does a renewal mean incrementing attestation_version?
2) attestation_version states "This allows the maintenance of a historical record of attestations." Is that something you plan on exposing to the public somewhere? Or would you expect a site to maintain previous versions somewhere?
Also, how does unenrollment happen?
Design document
https://docs.google.com/document/d/16PYa6wBBGBbV4YMujkFzBab8s4a7N4PcvpY0Js1qN1k/edit?usp=sharing
Specification
While the enrollment process itself is not intended to be standardized, the impacted API specifications allow for a user agent defined gating mechanism such as enrollment and attestation. The spec changes for the gated APIs are linked below:
Private aggregation (section with note on enrollment)
Shared Storage (pull request)
Topics (pull request)
Attribution reporting API (pull request)
Protected Audience (pull requests: 1, 2)
Summary and Motivation
As the Privacy Sandbox relevance and measurement APIs start ramping up for general availability, we want to make sure these technologies are used as intended and with transparency. The APIs include Attribution Reporting, the Protected Audience API, Topics, Private Aggregation and Shared Storage. As announced in a blog post, a new Developer Enrollment process for Privacy Sandbox relevance and measurement APIs is being introduced across Chrome and Android. This I2S refers to Chrome’s implementation of fetching the enrolled-sites list from the enrollment server (via component updater) and using it to gate access to the Privacy Sandbox APIs.
Blink component
Internals > AttributionReporting
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Supported on all the above platforms except Android WebView.
In the initial version, no gated APIs are supported on WebView , with the caveat that the Attribution Reporting API delegates from WebView to Android and would be gated as part of Android’s attestation based gating.
Debuggability
Console errors: The API surfaces gated on enrollment and attestation will output relevant console error messages if a given site is not allowed to participate/invoke those API surfaces. (Private Aggregation API-related console messages are output during its consumer API enrollment checks e.g. Shared Storage, but could be made more specific in the future).
Local override: For local testing, we are providing developer overrides with a Chrome flag and CLI switch:
Flag: chrome://flags/#privacy-sandbox-enrollment-overrides
CLI: --privacy-sandbox-enrollment-overrides=https://example.com,https://example.co.uk,...
Initial public proposal
https://github.com/privacysandbox/attestation/blob/main/README.md
TAG review
Private Aggregation (comment)
Shared Storage (comment)
Topics (comment)
Attribution reporting API (comment)
Protected Audience (comment)
Risks
Interoperability
Initially the enrolled and attested sites list will only be available to Chrome browsers. The list is publicly available in the sense that it's shipped to Chrome browsers, but we don't have an official site currently where we post it. However, we could potentially do so in the future and that would enable other browsers to have a consistent gating mechanism.
Compatibility
No compatibility concerns. The existing APIs either return promises, and will reject for callers that are not enrolled (and they can already reject for other reasons today), or they don’t return anything and the script will not break.
In my experience, developers don't often attempt to `catch()` rejected promises (...we're all very optimistic about our bug-free code and network conditions).
A quick spot check on 2 Privacy Sandbox API code examples shows we also seem to have left this out:
https://developer.chrome.com/docs/privacy-sandbox/topics/#access-topics
https://developer.chrome.com/docs/privacy-sandbox/protected-audience-api/ad-auction/#runadauction
We should probably update the docs to take error handling into
account, what do you think?
Is this feature fully tested by web-platform-tests?
No, as there are no plans to standardize this behavior.
Tracking bug
crbug.com/1448875
Launch bug
https://launch.corp.google.com/launch/4260778
Estimated milestones
M118
Links to previous Intent discussions
Intent to prototype: https://groups.google.com/a/chromium.org/g/blink-dev/c/Zy6uyaTdcJ8
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADAcp086BcDbQX%2B2ED-9eU06ZZPH6_MMpB0cr2F0Jf40H4EACw%40mail.gmail.com.
Hi Shivani,
In general I think this is a pretty interesting idea, just a few minor questions below:
On 8/30/23 8:16 AM, Shivani Sharma wrote:
Contact emails
shiva...@chromium.org, geor...@google.com
Explainer
https://github.com/privacysandbox/attestation/blob/main/README.md
A few questions about the attestation format:
1) expiry_seconds_since_epoch implies this expires. Is there any more info on this? Does a renewal mean incrementing attestation_version?
2) attestation_version states "This allows the maintenance of a historical record of attestations." Is that something you plan on exposing to the public somewhere? Or would you expect a site to maintain previous versions somewhere?
Also, how does unenrollment happen?
Is integration with the Reporting API also planned?
Design document
https://docs.google.com/document/d/16PYa6wBBGBbV4YMujkFzBab8s4a7N4PcvpY0Js1qN1k/edit?usp=sharing
Specification
While the enrollment process itself is not intended to be standardized, the impacted API specifications allow for a user agent defined gating mechanism such as enrollment and attestation. The spec changes for the gated APIs are linked below:
Private aggregation (section with note on enrollment)
Shared Storage (pull request)
Topics (pull request)
Attribution reporting API (pull request)
Protected Audience (pull requests: 1, 2)
Summary and Motivation
As the Privacy Sandbox relevance and measurement APIs start ramping up for general availability, we want to make sure these technologies are used as intended and with transparency. The APIs include Attribution Reporting, the Protected Audience API, Topics, Private Aggregation and Shared Storage. As announced in a blog post, a new Developer Enrollment process for Privacy Sandbox relevance and measurement APIs is being introduced across Chrome and Android. This I2S refers to Chrome’s implementation of fetching the enrolled-sites list from the enrollment server (via component updater) and using it to gate access to the Privacy Sandbox APIs.
Blink component
Internals > AttributionReporting
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Supported on all the above platforms except Android WebView.
In the initial version, no gated APIs are supported on WebView , with the caveat that the Attribution Reporting API delegates from WebView to Android and would be gated as part of Android’s attestation based gating.
Debuggability
Console errors: The API surfaces gated on enrollment and attestation will output relevant console error messages if a given site is not allowed to participate/invoke those API surfaces. (Private Aggregation API-related console messages are output during its consumer API enrollment checks e.g. Shared Storage, but could be made more specific in the future).
Since one of the stated goals is transparency, it would be nice to eventually host site enrollment and attestation in the open. Grabbing a file that is downloaded from the component updater isn't rocket science, but I wouldn't call it ergonomic. :)
Local override: For local testing, we are providing developer overrides with a Chrome flag and CLI switch:
Flag: chrome://flags/#privacy-sandbox-enrollment-overrides
CLI: --privacy-sandbox-enrollment-overrides=https://example.com,https://example.co.uk,...
Initial public proposal
https://github.com/privacysandbox/attestation/blob/main/README.md
TAG review
Private Aggregation (comment)
Shared Storage (comment)
Topics (comment)
Attribution reporting API (comment)
Protected Audience (comment)
Risks
Interoperability
Initially the enrolled and attested sites list will only be available to Chrome browsers. The list is publicly available in the sense that it's shipped to Chrome browsers, but we don't have an official site currently where we post it. However, we could potentially do so in the future and that would enable other browsers to have a consistent gating mechanism.
Compatibility
No compatibility concerns. The existing APIs either return promises, and will reject for callers that are not enrolled (and they can already reject for other reasons today), or they don’t return anything and the script will not break.
In my experience, developers don't often attempt to `catch()` rejected promises (...we're all very optimistic about our bug-free code and network conditions).
A quick spot check on 2 Privacy Sandbox API code examples shows we also seem to have left this out:
https://developer.chrome.com/docs/privacy-sandbox/topics/#access-topics
https://developer.chrome.com/docs/privacy-sandbox/protected-audience-api/ad-auction/#runadauctionWe should probably update the docs to take error handling into account, what do you think?
On 9/1/23 2:46 PM, Shivani Sharma wrote:
Thanks Mike! Responses inline.
On Fri, Sep 1, 2023 at 1:09 PM Mike Taylor <mike...@chromium.org> wrote:
Hi Shivani,
In general I think this is a pretty interesting idea, just a few minor questions below:
On 8/30/23 8:16 AM, Shivani Sharma wrote:
Contact emails
shiva...@chromium.org, geor...@google.com
Explainer
https://github.com/privacysandbox/attestation/blob/main/README.md
A few questions about the attestation format:
1) expiry_seconds_since_epoch implies this expires. Is there any more info on this? Does a renewal mean incrementing attestation_version?
2) attestation_version states "This allows the maintenance of a historical record of attestations." Is that something you plan on exposing to the public somewhere? Or would you expect a site to maintain previous versions somewhere?
Also, how does unenrollment happen?
1. Yes the plan is to have attestations expire, and have adtechs step through re-attestation process which would increment the version.2. The attestation file hosted on the .well-known will include all their historical attestations. We could also consider maintaining a historical record on the transparency server.
Unenrollment would be either when the original attestation expires or the entity explicitly requests to unenroll (via the form asking to cancel existing enrollment). When that happens, their data will be removed from the enrollment records and the updated list pushed to Chrome will not have their site.
Is integration with the Reporting API also planned?
Design document
https://docs.google.com/document/d/16PYa6wBBGBbV4YMujkFzBab8s4a7N4PcvpY0Js1qN1k/edit?usp=sharing
Specification
While the enrollment process itself is not intended to be standardized, the impacted API specifications allow for a user agent defined gating mechanism such as enrollment and attestation. The spec changes for the gated APIs are linked below:
Private aggregation (section with note on enrollment)
Shared Storage (pull request)
Topics (pull request)
Attribution reporting API (pull request)
Protected Audience (pull requests: 1, 2)
Summary and Motivation
As the Privacy Sandbox relevance and measurement APIs start ramping up for general availability, we want to make sure these technologies are used as intended and with transparency. The APIs include Attribution Reporting, the Protected Audience API, Topics, Private Aggregation and Shared Storage. As announced in a blog post, a new Developer Enrollment process for Privacy Sandbox relevance and measurement APIs is being introduced across Chrome and Android. This I2S refers to Chrome’s implementation of fetching the enrolled-sites list from the enrollment server (via component updater) and using it to gate access to the Privacy Sandbox APIs.
Blink component
Internals > AttributionReporting
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Supported on all the above platforms except Android WebView.
In the initial version, no gated APIs are supported on WebView , with the caveat that the Attribution Reporting API delegates from WebView to Android and would be gated as part of Android’s attestation based gating.
Debuggability
Console errors: The API surfaces gated on enrollment and attestation will output relevant console error messages if a given site is not allowed to participate/invoke those API surfaces. (Private Aggregation API-related console messages are output during its consumer API enrollment checks e.g. Shared Storage, but could be made more specific in the future).
The error reporting currently follows what happens in the gated APIs for their existing failure paths. Looking at their specs, it seems none of the gated APIs report via the reporting API today and either reject the promise or return. Given this, failure due to enrollment also doesn't have any specific plans to integrate with the reporting API.
Since one of the stated goals is transparency, it would be nice to eventually host site enrollment and attestation in the open. Grabbing a file that is downloaded from the component updater isn't rocket science, but I wouldn't call it ergonomic. :)
Local override: For local testing, we are providing developer overrides with a Chrome flag and CLI switch:
Flag: chrome://flags/#privacy-sandbox-enrollment-overrides
CLI: --privacy-sandbox-enrollment-overrides=https://example.com,https://example.co.uk,...
Initial public proposal
https://github.com/privacysandbox/attestation/blob/main/README.md
TAG review
Private Aggregation (comment)
Shared Storage (comment)
Topics (comment)
Attribution reporting API (comment)
Protected Audience (comment)
Risks
Interoperability
Initially the enrolled and attested sites list will only be available to Chrome browsers. The list is publicly available in the sense that it's shipped to Chrome browsers, but we don't have an official site currently where we post it. However, we could potentially do so in the future and that would enable other browsers to have a consistent gating mechanism.
Agree and this is on the roadmap for transparency reports.
Compatibility
No compatibility concerns. The existing APIs either return promises, and will reject for callers that are not enrolled (and they can already reject for other reasons today), or they don’t return anything and the script will not break.
In my experience, developers don't often attempt to `catch()` rejected promises (...we're all very optimistic about our bug-free code and network conditions).
A quick spot check on 2 Privacy Sandbox API code examples shows we also seem to have left this out:
https://developer.chrome.com/docs/privacy-sandbox/topics/#access-topics
https://developer.chrome.com/docs/privacy-sandbox/protected-audience-api/ad-auction/#runadauctionWe should probably update the docs to take error handling into account, what do you think?
Updating the docs makes sense. Adding +du...@google.com
On 9/1/23 2:46 PM, Shivani Sharma wrote:
Thanks Mike! Responses inline.
On Fri, Sep 1, 2023 at 1:09 PM Mike Taylor <mike...@chromium.org> wrote:
Hi Shivani,
In general I think this is a pretty interesting idea, just a few minor questions below:
On 8/30/23 8:16 AM, Shivani Sharma wrote:
Contact emailsshiva...@chromium.org, geor...@google.com
Explainer
https://github.com/privacysandbox/attestation/blob/main/README.md
A few questions about the attestation format:
1) expiry_seconds_since_epoch implies this expires. Is there any more info on this? Does a renewal mean incrementing attestation_version?
2) attestation_version states "This allows the maintenance of a historical record of attestations." Is that something you plan on exposing to the public somewhere? Or would you expect a site to maintain previous versions somewhere?
Also, how does unenrollment happen?
1. Yes the plan is to have attestations expire, and have adtechs step through re-attestation process which would increment the version.2. The attestation file hosted on the .well-known will include all their historical attestations. We could also consider maintaining a historical record on the transparency server.Cool - makes sense. The explainer (or blog post) could probably be updated to make this more clear.
Unenrollment would be either when the original attestation expires or the entity explicitly requests to unenroll (via the form asking to cancel existing enrollment). When that happens, their data will be removed from the enrollment records and the updated list pushed to Chrome will not have their site.
Thanks - it would be nice to document this in the explainer again (and the form, if it's not already documented).
--
Is this feature fully tested by web-platform-tests?No, as there are no plans to standardize this behavior.
Tracking bug crbug.com/1448875
Launch bughttps://launch.corp.google.com/launch/4260778
Estimated milestonesM118
Links to previous Intent discussions
Intent to prototype: https://groups.google.com/a/chromium.org/g/blink-dev/c/Zy6uyaTdcJ8
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
Thanks for the answer. It sounds like there is some compat risk for early adopters, but y'all have mechanisms in place to communicate the changes and do outreach if needed.
LGTM1 to ship.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1688dcc9-8dca-4e89-bc06-4b58725c22a9%40chromium.org.
Also: is there a chromestatus.com entry for this feature?
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADAcp086BcDbQX%2B2ED-9eU06ZZPH6_MMpB0cr2F0Jf40H4EACw%40mail.gmail.com.
I cannot understand how it is possible to claim transparency with the following explanation. It seems completely misleading.Today, the attestation model does not seek to provide information to users within the browser or device in real-time about a developer's attestations
This statement is under non goals. So I think you need to change that or remove the claim of transparency.
LGTM2 conditioned on the spec PRs landing (some are still open).
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADAcp0_M%3D2sAK%3DfVs_qgXON2pnxVcricnejtJUExm34fdgfgqw%40mail.gmail.com.
LGTM3On the compat front this is technically a breaking change for shipped APIs. Normally we'd want to see a more thorough a compat analysis to back up the claim of sites not being functionally broken. However, running through a compat analysis in my head I think what you've provided is sufficient, because:
- Our primary tool of UseCounters isn't going to be too helpful here. We know these APIs are being widely tested and we know we can't realistically measure whether errors are being handled properly. I don't have any easy suggestions for how to quantify this particular risk well.
- These are brand new APIs with a generally small number of customers who are probably actively experimenting
- All the APIs are for use cases which aren't directly relevant to the core functioning of a site - so any breakage is unlikely to be noticed by users, except possibly by ads not showing (though unhandled exceptions in async functions in initialization routines are potentially a problem)
- I know these launches are being rolled out and watched carefully. I assume we'll do some small percentage first and verify we don't hear complaints before ramping up? And worst case and there's significant functional breakage, we can use a killswitch to roll back, right?
While I know the utility of this system remains to be seen, I personally like the added transparency compared to the current state where these APIs are just available to anyone - especially given the new ground we're breaking with these APIs. I imagine researchers and others can get some value out of the .well-known file such as by crawling popular sites. However I can imagine some forms of research would benefit from access to the enrolled-sites list being used in Chrome (to analyze less popular sites that might not show up in a top sites list). Are you able to provide instructions for easily extracting the site list from a Chrome install? Or do you have a date by which you expect you can make the enrolled-sites list available elsewhere?
I don't see a particular interoperability concern here since we're not aware of any other browsers who have said they're shipping these APIs (right?), and if they were they could probably just make it available to all sites, clone our system, or use their own system for gating access (a similar cross-browser dynamic we have with the origin trials system, which doesn't appear to have been a problem so far). But we should keep our ears open for any other browser who might want to use a similar system and be open to collaboration.