Updates the UX elements for the SPC dialog on Android Chrome. Other than just UX presentation the following are being added: - Allowing merchants to provide an optional list of payment entity logos related to the payment that will be displayed in the UX (https://github.com/w3c/secure-payment-confirmation/pull/294). - Returning different output states back to the merchant depending on whether the user wants to continue the transaction without SPC or to cancel the transaction (https://github.com/w3c/secure-payment-confirmation/pull/292). Currently, we only send a single output state back for both cases. - A new payment detail label field will be added to the payment instrument so the text be presented across 2 lines in SPC (https://github.com/w3c/secure-payment-confirmation/pull/298)
Low risk. The SPC UX Refresh changes are only purely additive API shapes that are all backwards compatible. The risk is that other browser do not implement it.
Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
None
Web developers should be able to try the new SPC UX Refresh through a Chrome flag, thus no changes are needed in devtools.
SPC UX Refresh is added to Secure Payment Confirmation which is supported only on Android, Windows, and Mac.
Does the feature depend on any code or APIs outside the Chromium open source repository and its open-source dependencies to function?
NoneShipping on Android | 139 |
DevTrial on Android | 139 |
Open questions about a feature may be a source of future web compat or interop issues. Please list open issues (e.g. links to known github issues in the project for the feature specification) whose resolution may introduce web compat/interop risk (e.g., changing to naming or structure of the API in a non-backward-compatible way).
None--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com.
> Hey, with regards to providing logos. My understanding is that this would be displayed in a trusted content. Is there some affordances to clearly indicate that these logos are provided by the merchants? I'm a little concerned for cases like displaying arbitrary content in trusted UI because of things like hate symbols, among other things.Hi Vlad; you're completely right to be concerned in this regard - it is a general concern with SPC. Whilst we do care about this issue, our counter-argument is that there is no incentive to display misleading or offensive logos using SPC.Firstly, if we examine the 'offensive' case - what is the value of SPC here for someone who wants to offend? If I'm the website, I can render offensive iconography in an HTML 'bottomsheet' UX, with a Chrome logo at the top of it, and write whatever I want. Users will generally not know the difference, and many will just attribute that to being from Chrome anyway. We're actually not looking to present SPC as being "from Chrome" - there's no logo, for example. We've historically discussed this with security, and we have offered to remove the 'line of death/full screen scrim' to further divorce SPC from being 'browser UX' - but so far they haven't asked us to do that.Secondly, if we examine the 'misleading' case, we cover that in the spec (here and here), but broadly the answer is that even if you trick the user into creating an SPC cryptogram, it has no value unless you are literally processing a transaction with the underlying payment providers (and they are able to examine the output signed cryptogram to know exactly what data you provided to the user). So as a misleading attacker, you at best end up with an SPC cryptogram with no use for it.On Wed, 9 Jul 2025 at 12:01, Stephen Mcgruer <smcg...@chromium.org> wrote:> Sorry, I didn't read the WPT PRs you linked. I see that the tests already depend on test_driver.add_virtual_authenticator(). Is there anything blocking testing here, or is it OK if shipping this is conditional on the tests being landed?The main issue is that WebAuthn virtual authenticators are not supported on Chrome Android (as far as I know, cc @Nina Satragno ), whilst this feature is shipping first for SPC in Chrome Android (with Desktop to follow in a few milestones). So they're not going to pass when initially landed (and indeed will regress SPC's wpt.fyi status in Chrome), however we discussed this internally yesterday and decided its still better to have tests that reflect the specification even if they now fail due to lack of test support. So our plan is to land them in the coming days (once reviewed).
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
--Nina Satragno
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
----Nina Satragno
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/bbcefa96-47c5-4ad2-8f38-d735fd94e63an%40chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
--Nina Satragno
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
--Nina Satragno
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
LGTM3
/Daniel