Contact emails
sva...@chromium.org, cshar...@chromium.org, kle...@google.com
Explainer
https://github.com/WICG/trust-token-api
Design doc/Spec
No spec yet. TAG review requested.
Summary
This is a new API for propagating a notion of user trust across sites, without using cross-site persistent identifiers like third party cookies.
Note that this is a very early stage design, and we’re explicitly not asking for permission to ship yet. We would like to get initial feedback on the idea and start prototyping.
Motivation
The web ecosystem relies heavily on building trust signals to detect fraudulent or spammy actors. One common way this is done is via tracking an individual browser’s activity across the web, usually via associating stable identifiers across sites.
Preventing fraud is a legitimate use case that the web should support, but it shouldn’t require an API as powerful as a stable, global, per-user identifier. In third party contexts, merely segmenting users into trusted and untrusted sets seems like a useful primitive that also preserves privacy. This kind of fraud protection is important both for CDNs, as well as for the ad industry which receives a large amount of invalid, fraudulent traffic.
Risks
Interoperability and Compatibility
As this is a new feature, the risk here is mostly interoperability, in the case some browsers do not ship the feature.
Firefox: No public signals
Edge: No public signals
Safari: Public support. General support for the idea during TPAC 2019 discussion.
Web developers: There is positive interest from Cloudflare, who are also in the process of standardizing their Privacy Pass protocol.
Ergonomics
N/A
Activation
Using this feature requires spinning up a (or partnering with an existing) trust token issuer that can issue and verify trust tokens, which is non-trivial. Additionally, verifying properties of the Signed Redemption Record or the client signature require some cryptography. It would be beneficial to have server-side libraries that developers can use to help make using this API easier.
Security
See the security considerations section of the explainer.
Will this feature be supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Yes
Link to entry on the feature dashboard
https://chromestatus.com/feature/5078049450098688
Requesting approval to ship?
No
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/5b2b7f54-c866-41c2-b485-4a35cde1b0b8%40chromium.org.
--
You received this message because you are subscribed to a topic in the Google Groups "blink-dev" group.
To unsubscribe from this topic, visit https://groups.google.com/a/chromium.org/d/topic/blink-dev/X9sF2uLe9rA/unsubscribe.
To unsubscribe from this group and all its topics, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANduzxDYgmnkTSJ7XanE%2BRNONoj%2BM_XGmZ346jK6bYyzUw%3Dc%3DQ%40mail.gmail.com.
Steven Valdez | | Chrome Privacy Sandbox | | sva...@google.com | | 210-692-4742 |
(did you intend to drop blink-dev from the thread)
This is a bit closer to the original PrivacyPass proposal. The original reason for the UA doing the token redemption and SRRs was that requiring a publisher to have to perform a request to the issuer on every user might be prohibitively expensive, and when multiple third parties on one first-party site need trust tokens it would allow less abuse to do a single redemption controlled by the UA and then pass along the SRRs to all the relying third-parties.We could potentially support passing the raw trust token directly to the website, possibly by adding a param to send the trust token instead of the SRR to the site, though we'll need to be careful that the extension doesn't add additional abuse vectors (servers caching the tokens and redeeming them later, building pools of tokens for each user to more easily leak state across the token issuance/redemption, etc). It may also be harder to mitigate potential abuse from issuers who decide to block websites from redeeming tokens (blocking UAs from redeeming tokens is also an issue in the current design, but more easily detectable from the UA).On Tue, Oct 15, 2019 at 6:45 PM Michaela Merz <misc...@googlemail.com> wrote:Steven - I still don't think this is good enough. Here's my suggestion: User A is being verified as trusted by say Google. He get's a a number of anonymous tokens which can not be traced back to the particular user. If requested by site b, the browser passes a token to the site which then forwards it to Google (the token has a an issuer identifier). Google answers with an ACK or NACK and the user is verified (or not), without any loss of privacy.Michaela
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKDb%2By7Y3xPvN_rnq6_y%3DJpek_nZhqO3P6hU7Mpfg-as1gFMfg%40mail.gmail.com.