sau...@google.com, las...@google.com, nic...@google.com, erict...@chromium.org, ryan...@google.com, ayk...@google.com
https://github.com/GoogleChrome/ip-protection/blob/main/prt_explainer.md
https://datatracker.ietf.org/doc/html/draft-pfeiffenberger-prtokens-00
To enable businesses to estimate the amount of fraud on their systems, train models to defend against fraud, and analyze emerging fraudulent behavior while still mitigating the ability to track users at scale using IP addresses, we propose the introduction of a delayed IP sampling mechanism called Probabilistic Reveal Tokens (PRTs) alongside IP Protection for use in proxied traffic. Chrome plans to launch IP Protection in incognito mode later this year.
PRTs will be included on proxied requests in a new HTTP header added by the browser for domains that indicate they want to receive them via a signup process. Each PRT contains a ciphertext, generated by an Issuer and re-randomized by the browser for unlinkability prior to the request, that the recipient can decrypt after a delay. Google will be the issuer for Chrome's implementation. A minority of the decrypted PRTs contain the client's pre-proxy IP address (i.e. non-masked, and as observed by the token issuer), while the remaining PRTs provide no information about the client's original IP address. This results in only a small percent of PRTs containing and revealing the user's IP.
Our explainer introduces key tunable parameters for this proposal:
Reveal rate: the percentage of the time that the tokens are revealed
Epoch and delay period length: the periods after which tokens are made available
We will initially set reveal rate to 10% and epoch and delay period length both to 24 hours each.
Developers that want to receive PRTs will need to request them at console.privacysandbox.google.com. Sign ups will open when PRTs are available in pre-Stable channels.
Privacy>Fingerprinting>IPProtection
The IP Protection TAG review, for which this feature is closely tied, was closed by the TAG as “Resolution: Decline” (https://github.com/w3ctag/design-reviews/issues/1083)
Resolution Decline
None
Gecko: No signal (https://github.com/mozilla/standards-positions/issues/1273)
WebKit: No signal (https://github.com/WebKit/standards-positions/issues/529)
Web developers: Positive signal from invalid traffic detection providers, though open questions remain about the impact on fraud detection with initial parameter settings. As IP Protection launches, we’ll continue to solicit feedback.
Other signals:
Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
None
Attached PRTs are visible in the Chrome DevTools Network panel.
No, supported everywhere IP Protection is supported (no WebView).
No, as there is no browser API for actuating PRTs (only a header attached as part of IP Protection), we don’t plan to add any.
https://github.com/explainers-by-googlers/prtoken-reference/blob/main/prt_dev_testing.md
None
EnableProbabilisticRevealTokens - Note that there are many subtleties to enabling this feature, please see DevTrial instructions for enabling locally.
Will ship enabled for all users
False
https://launch.corp.google.com/launch/4367692
None
https://chromestatus.com/feature/4914046966693888?gate=6289919137546240
Theodore Olsauskas-Warren
Software Engineering Manager
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CA%2B0Xr79QUTJt7bi443Ax5eMD2z%3DCsqV0o4__0tNvqKbMmLb5fg%40mail.gmail.com.
Thanks for the feedback, Reilly. While the original IP Protection feature’s TAG review covers some ground on PRTs, you’re right that it’s possible the TAG may want to weigh in differently on PRTs specifically as opposed to IP Protection generally. We’ve filed a TAG request here.
At the same time, we also recognize that the protocol introduced here is likely best reviewed in an IETF forum, and would just flag for reviewers that we do hope to pursue discussions at IETF 124 this fall.
Theo.
LGTM1
I think this strikes the right balance between protecting users from known trackers and the ability to detect fraud and abuse. I'm not sure that 10% reveal after 24 hours is the magic recipe, but appreciate that these are configurable such that the team will be able to adapt to feedback / new information.
aside: I don't think we need to block on TAG review here, but encourage the team to follow up with the relevant IETF groups to get a broader review on the design.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/98e6b10c-f5c5-4852-b4b5-ff4da46c43bdn%40chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/98e6b10c-f5c5-4852-b4b5-ff4da46c43bdn%40chromium.org.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/17308ea5-3320-4d26-bc1f-067615267ccdn%40chromium.org.
Hi folks,
Yoav, thank you for your suggestions, we reached out to the MASQUE listserv for feedback and responded to TAG reviewers with more details about the utility and privacy properties.
Rick, as to your question, we have a reference implementation (covering issuance, re-randomization & decryption), with tooling support for websites that can easily be used to validate other implementations. We commit to providing more conformance test support if another browser expresses interest in building PRTs.
To be clear, we are committed to responding to ecosystem needs and evolving PRTs over time.
Finally, thank you Scott and David for commenting about your interest in testing PRTs!
Thanks all,
Eric
Hi folks,
Yoav, thank you for your suggestions, we reached out to the MASQUE listserv for feedback and responded to TAG reviewers with more details about the utility and privacy properties.
Rick, as to your question, we have a reference implementation (covering issuance, re-randomization & decryption), with tooling support for websites that can easily be used to validate other implementations. We commit to providing more conformance test support if another browser expresses interest in building PRTs.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.