That is great news, thank you for the update! We appreciate the review and action, it will absolutely help us ensure a smoother and more seamless transition for our clients.
Thanks, Adam On Tuesday, December 26, 2023 at 11:18:43 AM UTC-5 Kaustubha Govind wrote: > Hi Adam, > > Just FYI, we are in the process of setting up a first-party deprecation > trial (applicable to non-advertising usecases only) as you requested. > Please see this thread > <https://groups.google.com/a/chromium.org/g/blink-dev/c/yGUdvW_t_y0/m/DafsVzHFAQAJ> > > for details. > > K > > On Thursday, December 7, 2023 at 6:43:27 AM UTC-5 Johann Hofmann wrote: > >> Hi Adam, >> >> Thank you for the detailed feedback. I'm discussing with the team and >> will follow up here. >> >> Thanks, >> >> Johann >> >> On Tue, Dec 5, 2023, 17:17 Adam Gertenbach <agert...@axisgroup.com> >> wrote: >> >>> Good morning all, >>> >>> Our organization is currently re-reviewing the impacts of the third >>> party cookie deprecation now that registration for deprecation trials have >>> been made available. Among our offerings, we provide consulting, hosting, >>> architecture, and development services for customers in the business >>> intelligence and enterprise analytics space, including Microsoft Power BI, >>> Qlik Sense, ThoughtSpot, and Tableau. The ability to provide embedding of >>> analytics capabilities, such as visualizations and dashboards, is common >>> across the industry and is supported by each of the major vendors; as such, >>> we've facilitated these capabilities in architecting and building solutions >>> for our customers, often using these embedding capabilities to create >>> custom solutions or enhance enterprise portals that have seen very large >>> adoption. >>> >>> >>> https://help.qlik.com/en-US/sense-developer/November2023/Content/Sense_Helpsites/embed-qlik-sense.htm >>> >>> https://learn.microsoft.com/en-us/power-bi/collaborate-share/service-embed-secure >>> https://docs.thoughtspot.com/cloud/latest/intro-embed >>> https://help.tableau.com/current/pro/desktop/en-us/embed.htm >>> >>> As one might expect, these embedded solutions are often reliant on a >>> combination of iframes and cross domain third-party cookies to supply >>> authentication and authorization and cannot be made to operate under a >>> single domain. While we intend to actively engage with these vendors to >>> notify them of expected breakage due to the pending deprecation and would >>> hope that options for partitioning/CHIPS will make its way into these >>> products in a timely fashion, there is a significant risk that existing >>> solutions will be impacted in the interim period; furthermore, the customer >>> perception around this breakage is likely to impact our reputation based on >>> our role in delivery, despite the fact that we do not and cannot directly >>> resolve the underlying cause without third-party participation and product >>> updates. >>> >>> Historically, resolution of these types of issues have not always been >>> proactive. Qlik Sense had to update their interfaces as the SameSite None >>> rollout was occurring due to customer breakage ( >>> https://community.qlik.com/t5/Official-Support-Articles/Missing-SameSite-attribute-blocks-requests-in-Chrome-80-and/ta-p/1712551 >>> >>> ). More recently, Microsoft's Power BI login process for embedded reports >>> broke in September when the third-party storage partitioning policies were >>> enabled due to their use of cross-window localStorage usage for signaling >>> during authentication. Not knowing that this was in use by their product, >>> mitigation of this issue involved an all-nighter investigation on our part >>> to understand what was happening and the enrollment of a first-party >>> deprecation trial by us to re-enable services for our customers. >>> >>> While I recognize the motivations behind the strategies outlined, the >>> lack of a first-party deprecation trial to provide wide-spread temporary >>> mitigation is likely to significantly impair our service offerings and >>> existing customer solutions while these issues are ironed out and >>> implemented by these vendors. We're hoping to prepare our customers through >>> proactive messaging where possible (enterprise policy, anticipated per-user >>> UI overrides, etc.) but I'd like to call out this scenario and see if >>> there's anything I'm missing in terms of short-term solutions available to >>> us, and to ask if a first-party deprecation trial offering is expected for >>> cases like these where influence on the owners of third-party embeds is >>> limited. >>> >>> On Tuesday, November 21, 2023 at 7:56:58 PM UTC-5 Rick Byers wrote: >>> >>>> LGTM2 - It's time. >>>> >>>> Given that this is our biggest breaking change ever and I've gotten >>>> some feedback saying at least a couple people appreciate it when I expand >>>> on my thought process in compat analysis, I figured I should take the time >>>> to try to systematically evaluate this against our blink compat >>>> principles >>>> <https://docs.google.com/document/d/1RC-pBBvsazYfCNNUSkPqAVpSpNJ96U8trhNkfV0v9fk/edit#heading=h.83o2xr8ayal6>. >>>> >>>> Hopefully we'll learn some things from how this deprecation goes in >>>> practice to help us further improve our framework for evaluating and >>>> mitigating future compat risk. >>>> >>>> - *Minimizing end-user impact* >>>> - *Page views impacted: High risk* >>>> - The UseCounter >>>> >>>> <https://chromestatus.com/metrics/feature/timeline/popularity/3408> >>>> has been steady at around 46% for years. Clearly a huge risk from >>>> our first >>>> line of reasoning. >>>> - *Unique sites impacted: High risk* >>>> - I don't have a pointer to data handy, but I assume it's >>>> also very large (eg. due to 3p embeds like ads). >>>> - *Severity of breakage: Moderate risk* >>>> - One argument is that most sites already need to work for >>>> all the Safari and Firefox users and the X% of Chrome users with >>>> 3P cookies >>>> disabled, and so have adapted. >>>> - But on the other hand we have plenty of examples of sites >>>> which just tell users they must enable 3PCs to make the site >>>> function at >>>> all. >>>> - So I think we have to say that there are a non-trivial >>>> number sites where the severity is total site breakage - >>>> necessitating all >>>> the mitigations, even if most impacted sites have non-visible >>>> breakage. >>>> - *Chrome's release process: Moderate mitigation* >>>> - This change is under very careful finch control with tons >>>> of monitoring. >>>> - We also have a variety of feedback channels including the >>>> manual breakage reporting Johann mentioned, as well as monitoring >>>> of user >>>> behavior to infer breakage, and a pretty big team motivated to >>>> react >>>> quickly to keep user impact to a minimum. >>>> - One thing to be mindful of here is that the CMA-mandated 1% >>>> experiment will place some limits on the team's options to >>>> respond to >>>> reports of breakage (eg. the deprecation trial says it can't be >>>> used by >>>> sites on the disconnect.me advertising list). >>>> - *User opt-out: Very strong mitigation* >>>> - I've been playing with the cookie control UI (eg. see >>>> screenshot below) on my personal account and I'm quite happy with >>>> it. I've >>>> seen the user education directing me to this UI including in >>>> scenarios like >>>> when I reload a page. Some of that may be experiments or things >>>> undergoing >>>> design change (I don't actually know the specific plans, just >>>> commenting on >>>> what I've experienced personally), but it gives me confidence >>>> that the team >>>> is seriously working to educate users on how to opt-out in the >>>> case of >>>> breakage. >>>> [image: image.png] >>>> - *Maximizing user experience* >>>> - *Security & Privacy: Strong mitigation* >>>> - Personally it seems clear to me (and eg. the W3C TAG >>>> <https://www.w3.org/2001/tag/doc/web-without-3p-cookies>) >>>> that 3PCs being off is the right long-term default for the web in >>>> the name >>>> of privacy. >>>> - In addition I believe there's some security benefit - eg. >>>> making side-channel attacks for sharing data between frames less >>>> useful to >>>> attackers >>>> - *Performance: Weak mitigation* >>>> - You could argue that sites will be faster without 3PCs, but >>>> I suspect that's temporary. >>>> - Perhaps more importantly, the deprecation of 3PCs creates >>>> pressure to raise the level of abstraction of the web and I think >>>> history >>>> has shown that we can make the web faster the more sites operate >>>> at a >>>> higher level of abstraction (eg. consider scrolling/animation >>>> being >>>> JS-driven vs. browser-driven and the rise of threaded compositing >>>> with >>>> mobile browsers and how web advertising might look 5-10 years >>>> from now). >>>> - *User annoyance: Weak mitigation* >>>> - Maybe a risk of some increase in annoyance - eg. need >>>> popups for some things that used to work in-page via iframes. >>>> - Certainly having to turn 3PCs back on for a site that >>>> doesn't work otherwise will be annoying >>>> - I'd also argue that, like for performance, raising the >>>> level of abstraction will give us more opportunity to reduce >>>> annoyance. Eg. >>>> users will have more centralized and consistent control over >>>> their >>>> advertising preferences. >>>> - *Minimizing web-developer impact* >>>> - *Ease of adaptation: Moderate mitigation* >>>> - Key functional scenarios like identity have well known and >>>> long-used alternatives like pop-ups and redirects. Chrome >>>> adopting the >>>> temporary heuristics already used successfully by other browsers >>>> seems like >>>> a significant mitigation for these flows to me. >>>> - The requestStorageAccess API is a drop-in option in many >>>> scenarios (again, already deployed for other browsers) >>>> - Advertising use cases require a lot more work to adapt to, >>>> but massive effort has gone into (and will presumably keep going >>>> into) >>>> building and validating these alternatives. >>>> - *Developer opt-in / opt-out: Strong mitigation* >>>> - The deprecation trial seems like a big mitigation to me - >>>> pretty easily giving non-ads origins an extra year. >>>> - The prior move to require SameSite=None also seems like a >>>> significant mitigation, developers have effectively been opting >>>> into 3PCs >>>> in chromium for three years! >>>> - There's also been an effort to variety of mechanisms and >>>> tools for developers to opt-in to 3PCD and validate their site >>>> works >>>> - *Enterprise policy opt-out: Moderate mitigation* >>>> - Policy control exists. Given the scope of potential impact >>>> in enterprises, this still seems like an area of some risk to me >>>> (eg. BYOD >>>> scenarios with Chromium-only custom apps). But again the user >>>> opt-out is a >>>> huge mitigation for this risk. >>>> - *Debuggability: Moderate mitigation* >>>> - Purpose-built tools A variety of tools have been built to >>>> help developers understand and adapt their cookie usage. Still >>>> cookies can >>>> be complicated, there's no silver bullet. >>>> - *Outreach: Moderate mitigation* >>>> - Almost certainly more outreach than we've ever done for a >>>> deprecation (even Flash!), yet still not so much as to avoid the >>>> likelihood of some developers being surprised. This is a place >>>> one could >>>> always argue for more work, but it's hard to know where the point >>>> of >>>> diminishing returns is, especially prior to the slow roll-out >>>> even >>>> starting. I expect this is something we'll learn more about >>>> during the 1% >>>> experiment period to guide the ramp-up process after that. >>>> - *Maximizing web ecosystem benefit* >>>> - *Interoperability: Strong mitigation* >>>> - The other two major engines have disabled 3PCs by default >>>> for some time. I'm personally uncomfortable with 3PC-related >>>> breakage being >>>> a reason why developers might encourage users to use >>>> chromium-based >>>> browsers. Restoring interoperability across browsers seems like >>>> strong >>>> motivation for accepting some risk here. >>>> - The team has gone the extra mile to advance specs, write >>>> WPTs and generally work to move the web away from UA-specific >>>> heuristics to >>>> a new likely interoperable and standardized state wrt. cookie >>>> behavior >>>> - *Standards conformance: Weak mitigation* >>>> - No standard requires 3PCD, but it seems likely that future >>>> web standards will be built under the assumption of 3PCs being >>>> unavailable >>>> (lots of such specs in development on a standards track) >>>> - *IP rights: Not relevant* >>>> - *Accepted interop risk: Not relevant* >>>> >>>> Overall it seems to me like the high risks are appropriately balanced >>>> by significant mitigations and justifications for accepting the cost of >>>> the >>>> risk. More importantly, every technical tool in our web compat toolbox has >>>> been brought to bear on mitigating the risks, and significant resources >>>> are >>>> devoted to monitoring and responding to any issues. I both trust the team >>>> to effectively manage the risk during roll-out and expect that there will >>>> be some bumps and mistakes that we will want to learn from. >>>> >>>> Best of luck! >>>> Rick >>>> >>>> On Wed, Nov 15, 2023 at 5:43 PM Johann Hofmann <joha...@chromium.org> >>>> wrote: >>>> >>>>> Hi Daniel, >>>>> >>>>> On Wed, Nov 15, 2023 at 6:09 PM Daniel Bratell <brat...@gmail.com> >>>>> wrote: >>>>> >>>>>> You say Q1 2024, but do you know a more exact date? I ask because we >>>>>> are entering the holiday freeze period when companies do no changes >>>>>> whatsoever and even if this makes a site want to fix something, they >>>>>> might >>>>>> not be able to until some time into the quarter. >>>>>> >>>>> >>>>> we're currently planning for early Jan, i.e. M120 would be the first >>>>> release that contains the technical capabilities to ramp to 1% (breakage >>>>> mitigations, quantitative testing). The holiday freeze is definitely a >>>>> risk >>>>> to call out here. However, as mentioned in the intent, we're already >>>>> operating under the assumption that some sites, despite our outreach >>>>> efforts, will only find out about this once the deprecation begins. To >>>>> help >>>>> with that, we have a number of temporary mitigations available that work >>>>> quickly and effectively and can be initiated by various stakeholders in >>>>> this process (site, user, browser). While not directly relevant to the >>>>> web >>>>> platform pieces, we plan to have user interface controls to give >>>>> temporary >>>>> exceptions per top-level site in Chrome. >>>>> >>>>>> >>>>>> I also think it might be good to split it into the 1% part, and a >>>>>> 100% part since it is hard to judge the web compatibility level already >>>>>> and >>>>>> that is part of what the 1% run will do. >>>>>> >>>>> >>>>> The 1% is a long-running testing period that we're doing as part of >>>>> the commitments we entered with the CMA. However, from a readiness / web >>>>> platform perspective, we'd really like to treat it with the same >>>>> seriousness and care that we would treat a full rollout, as 1% of users >>>>> (over a significant amount of time) should not have a greatly degraded >>>>> user >>>>> experience. We're trying to ship the full array of breakage mitigations >>>>> we >>>>> will have available for potential future rollouts in this phase as well. >>>>> >>>>> So, if possible, I'd prefer to discuss any concerns you might have >>>>> about web compatibility, mitigations and ecosystem readiness in this >>>>> thread, rather than pushing it further out. :) >>>>> >>>>> Thanks, >>>>> >>>>> Johann >>>>> >>>>> >>>>>> /Daniel >>>>>> On 2023-11-13 17:52, David Dabbs wrote: >>>>>> >>>>>> Thanks for the explanation. >>>>>> >>>>>> David >>>>>> >>>>>> >>>>>> On Monday, November 13, 2023 at 9:30:55 AM UTC-6 Johann Hofmann wrote: >>>>>> >>>>>>> Hey David, yeah, that was me trying to fix the entry not showing up >>>>>>> on API Owner dashboards. I don't think that was what fixed it though, >>>>>>> so I >>>>>>> can change it back to "In Developer Trial" (which feels like the most >>>>>>> accurate right now?) >>>>>>> >>>>>>> Thanks! >>>>>>> >>>>>>> Johann >>>>>>> >>>>>>> >>>>>>> On Mon, Nov 13, 2023, 16:10 David Dabbs <david...@epsilon.com> >>>>>>> wrote: >>>>>>> >>>>>>>> This morning's Implementation status change to *Deprecated* >>>>>>>> results in >>>>>>>> >>>>>>>> Deprecate Third-Party Cookies >>>>>>>> <https://chromestatus.com/feature/5133113939722240> (Deprecated) >>>>>>>> >>>>>>>> Did you intend to also rename the feature to "Third-Party Cookies?" >>>>>>>> >>>>>>>> >>>>>>>> Thanks >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> On Monday, November 13, 2023 at 4:20:47 AM UTC-6 >>>>>>>> yoav...@chromium.org wrote: >>>>>>>> >>>>>>>>> LGTM1 >>>>>>>>> >>>>>>>>> I cannot imagine a more thorough and thoughtful approach than the >>>>>>>>> one the Privacy Sandbox team has taken to tackle this significant >>>>>>>>> change to >>>>>>>>> the web's privacy model while minimizing breakage and providing >>>>>>>>> replacement >>>>>>>>> APIs. Thanks for pushing this important work through!! >>>>>>>>> >>>>>>>>> On Mon, Nov 13, 2023 at 10:31 AM Johann Hofmann < >>>>>>>>> joha...@chromium.org> wrote: >>>>>>>>> >>>>>>>>>> Contact emails >>>>>>>>>> >>>>>>>>>> joha...@chromium.org, wande...@chromium.org, >>>>>>>>>> dylan...@chromium.org, kaust...@chromium.org, jka...@chromium.org, >>>>>>>>>> john...@chromium.org >>>>>>>>>> >>>>>>>>>> Explainer >>>>>>>>>> >>>>>>>>>> For general information on Privacy Sandbox for the Web and >>>>>>>>>> Google’s plans to phase out third-party cookies, see >>>>>>>>>> https://privacysandbox.com/open-web/. >>>>>>>>>> >>>>>>>>>> For additional information on the planned semantics of >>>>>>>>>> third-party cookie blocking and its interaction with the SameSite >>>>>>>>>> cookie >>>>>>>>>> attribute, see >>>>>>>>>> https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Specification >>>>>>>>>> >>>>>>>>>> The Cookies RFC contains some language >>>>>>>>>> <https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-rfc6265bis-12#name-the-cookie-header-field> >>>>>>>>>> >>>>>>>>>> that, in theory, allows user agents to block third-party cookies, >>>>>>>>>> leaving a >>>>>>>>>> lot of details unspecified. We are not happy with this status quo >>>>>>>>>> and are >>>>>>>>>> collaborating with other browsers on a significant spec refactoring >>>>>>>>>> effort >>>>>>>>>> called cookie layering >>>>>>>>>> <https://github.com/httpwg/http-extensions/issues/2084> to give >>>>>>>>>> Fetch/HTML more responsibility over specifying how and when cookies >>>>>>>>>> are >>>>>>>>>> stored and attached, as well as a WebAppSec Note based on our >>>>>>>>>> existing >>>>>>>>>> explainer >>>>>>>>>> <https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics> >>>>>>>>>> >>>>>>>>>> that describes how cookie blocking interacts with SameSite cookies. >>>>>>>>>> >>>>>>>>>> Summary >>>>>>>>>> >>>>>>>>>> We intend to deprecate and remove default access to third-party >>>>>>>>>> (aka cross-site) cookies as part of the Privacy Sandbox Timeline >>>>>>>>>> for the Web >>>>>>>>>> <https://privacysandbox.com/open-web/#the-privacy-sandbox-timeline>, >>>>>>>>>> starting with an initial 1% testing period in Q1 2024 >>>>>>>>>> <https://developer.chrome.com/docs/privacy-sandbox/chrome-testing/>, >>>>>>>>>> followed by a gradual phaseout planned to begin in Q3 2024 after >>>>>>>>>> consultation >>>>>>>>>> with the CMA >>>>>>>>>> <https://www.gov.uk/cma-cases/investigation-into-googles-privacy-sandbox-browser-changes> >>>>>>>>>> >>>>>>>>>> (The gradual phaseout is subject to addressing any remaining >>>>>>>>>> competition >>>>>>>>>> concerns of the UK’s Competition and Markets Authority.) >>>>>>>>>> >>>>>>>>>> Phasing out third-party cookies (3PCs) is a central effort to the >>>>>>>>>> Privacy Sandbox initiative, which aims to responsibly reduce >>>>>>>>>> cross-site >>>>>>>>>> tracking on the web (and beyond) while supporting key use cases >>>>>>>>>> through new >>>>>>>>>> technologies. Our phaseout plan was developed with the UK's >>>>>>>>>> Competition and >>>>>>>>>> Markets Authority, in line with the commitments >>>>>>>>>> <https://blog.google/around-the-globe/google-europe/path-forward-privacy-sandbox/> >>>>>>>>>> >>>>>>>>>> we offered for Privacy Sandbox for the web. >>>>>>>>>> >>>>>>>>>> Blink component >>>>>>>>>> >>>>>>>>>> Internals>Network>Cookies >>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ECookies> >>>>>>>>>> >>>>>>>>>> Motivation >>>>>>>>>> >>>>>>>>>> Our goal on the Privacy Sandbox is to reduce cross-site tracking >>>>>>>>>> while still enabling the functionality that keeps online content and >>>>>>>>>> services freely accessible by everyone. Deprecating and removing >>>>>>>>>> third-party cookies encapsulates the challenge, as they enable >>>>>>>>>> critical >>>>>>>>>> functionality across sign-in, fraud protection, advertising, and >>>>>>>>>> generally >>>>>>>>>> the ability to embed rich, third-party content in websites—but at >>>>>>>>>> the same >>>>>>>>>> time they're also a key enabler of cross-site tracking. >>>>>>>>>> >>>>>>>>>> Initial public proposal >>>>>>>>>> >>>>>>>>>> N/A >>>>>>>>>> >>>>>>>>>> TAG review >>>>>>>>>> >>>>>>>>>> The TAG has explicitly endorsed >>>>>>>>>> <https://w3ctag.github.io/web-without-3p-cookies/#why-restrict-third-party-cookies> >>>>>>>>>> >>>>>>>>>> (n.b. as a draft document) the deprecation of third-party cookies in >>>>>>>>>> the >>>>>>>>>> past. Additionally, we requested feedback on our proposal to >>>>>>>>>> define the 3PC security semantics >>>>>>>>>> <https://github.com/w3ctag/design-reviews/issues/904> and >>>>>>>>>> received generally positive feedback. >>>>>>>>>> >>>>>>>>>> TAG review status >>>>>>>>>> >>>>>>>>>> Tentatively Positive, see above >>>>>>>>>> >>>>>>>>>> Risks >>>>>>>>>> Compatibility >>>>>>>>>> >>>>>>>>>> Impact on the Ads ecosystem: >>>>>>>>>> >>>>>>>>>> A suite of APIs for delivering relevant ads, measuring ad >>>>>>>>>> performance, and preventing fraud and abuse are now generally >>>>>>>>>> available in >>>>>>>>>> Chrome to continue to facilitate ad-supported content on the web. We >>>>>>>>>> continue to work closely with the UK Competition and Markets >>>>>>>>>> Authority >>>>>>>>>> (CMA) on evaluating the impact of this change on the ads ecosystem. >>>>>>>>>> >>>>>>>>>> Web Compatibility: >>>>>>>>>> >>>>>>>>>> Despite 3PCs already being blocked in Firefox and Safari and >>>>>>>>>> developer outreach efforts to raise awareness and encourage >>>>>>>>>> developers to >>>>>>>>>> prepare for the deprecation, we currently estimate that a >>>>>>>>>> non-trivial >>>>>>>>>> number of sites are still relying on third-party cookies for some >>>>>>>>>> user-facing functionality. To address this breakage, we have >>>>>>>>>> developed a >>>>>>>>>> two-pronged strategy: >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 1. >>>>>>>>>> >>>>>>>>>> Breakage Discovery & Outreach >>>>>>>>>> >>>>>>>>>> Through various efforts, such as UKM-based signal analysis, >>>>>>>>>> scaled manual testing and dogfooding, we are collecting a list of >>>>>>>>>> impacted >>>>>>>>>> use cases. These individual breakage cases inform our mitigation >>>>>>>>>> strategy >>>>>>>>>> (see next step) and future API improvements, as well as our ongoing >>>>>>>>>> developer outreach efforts. >>>>>>>>>> >>>>>>>>>> We also offer developers the ability to report 3PC breakage to >>>>>>>>>> the Chrome team via goo.gle/report-3pc-broken or ask general >>>>>>>>>> questions at >>>>>>>>>> https://github.com/GoogleChromeLabs/privacy-sandbox-dev-support/issues >>>>>>>>>> . >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 1. >>>>>>>>>> >>>>>>>>>> Temporary Breakage Mitigation >>>>>>>>>> >>>>>>>>>> It will take time for developers to replace their usage of 3PCs >>>>>>>>>> with new APIs or different approaches, and some developers may not >>>>>>>>>> be aware >>>>>>>>>> of this deprecation until they discover breakage. In order to reduce >>>>>>>>>> the >>>>>>>>>> impact of such breakage on the web, we have implemented a series of >>>>>>>>>> temporary mitigations: >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> - >>>>>>>>>> >>>>>>>>>> Exemption Heuristics >>>>>>>>>> >>>>>>>>>> <https://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md>: >>>>>>>>>> >>>>>>>>>> We are planning to ship heuristics mirroring those that already >>>>>>>>>> ship in >>>>>>>>>> Firefox and Safari, and are also working with both browsers on a >>>>>>>>>> coordinated removal process. Additional details can be found & >>>>>>>>>> should be >>>>>>>>>> discussed in the I2P >>>>>>>>>> >>>>>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/Eeh2pE0DRaE/m/1BJyBlCUAAAJ> >>>>>>>>>> >>>>>>>>>> & upcoming I2S. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> - >>>>>>>>>> >>>>>>>>>> Deprecation Trial: >>>>>>>>>> >>>>>>>>>> <https://developer.chrome.com/blog/cookie-countdown-2023oct/#request-additional-time-with-the-third-party-deprecation-trial-for-non-advertising-use-cases> >>>>>>>>>> >>>>>>>>>> This will be outlined in more detail in the upcoming Request for >>>>>>>>>> Deprecation Trial, but it’s important to note that a review step >>>>>>>>>> including >>>>>>>>>> evidence of user-facing breakage will be required for >>>>>>>>>> participation. >>>>>>>>>> Further, we do not intend to approve trials for ads-related use >>>>>>>>>> cases, to >>>>>>>>>> avoid interference with the quantitative testing. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> - >>>>>>>>>> >>>>>>>>>> As with other launches, we will also have a set of >>>>>>>>>> server-side controls to manage the rollout as a whole and >>>>>>>>>> minimize issues >>>>>>>>>> specific sites are causing for users. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Despite all these efforts, we want to be clear that we are >>>>>>>>>> intentionally taking some risk here in the interest of user privacy. >>>>>>>>>> >>>>>>>>>> Enterprise Compatibility: >>>>>>>>>> >>>>>>>>>> To help with the transition, we intend to allow enterprise >>>>>>>>>> organizations to opt their applications out of third-party cookie >>>>>>>>>> blocking >>>>>>>>>> using the existing BlockThirdPartyCookies >>>>>>>>>> <https://chromeenterprise.google/policies/#BlockThirdPartyCookies> >>>>>>>>>> or CookiesAllowedForUrls >>>>>>>>>> <https://chromeenterprise.google/policies/#CookiesAllowedForUrls> >>>>>>>>>> policies. Given that enterprise systems are often gated and are >>>>>>>>>> therefore >>>>>>>>>> hard to analyze from an external perspective, these policies will >>>>>>>>>> provide >>>>>>>>>> additional time for the enterprise ecosystem to adapt. We intend to >>>>>>>>>> publish >>>>>>>>>> additional guidance for enterprises on >>>>>>>>>> https://goo.gle/3pcd-enterprise for the period beyond the 1% >>>>>>>>>> testing period. >>>>>>>>>> >>>>>>>>>> Interoperability >>>>>>>>>> >>>>>>>>>> Both Firefox and Safari have removed default access to >>>>>>>>>> third-party cookies already, though there are small differences >>>>>>>>>> <https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics> >>>>>>>>>> >>>>>>>>>> in how browsers treat SameSite=None cookies in so called “ABA” >>>>>>>>>> scenarios >>>>>>>>>> (site A embeds site B, which embeds site A again). Chrome ships the >>>>>>>>>> more >>>>>>>>>> secure and more restrictive variant, and from initial conversations >>>>>>>>>> we are >>>>>>>>>> optimistic that other browsers will adopt it as well. There are also >>>>>>>>>> subtle >>>>>>>>>> differences in how browsers restore access to third-party cookies >>>>>>>>>> through >>>>>>>>>> mechanisms such as heuristics or custom quirks. Where Chrome >>>>>>>>>> implements >>>>>>>>>> similar measures (such as the heuristics >>>>>>>>>> <https://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md>), >>>>>>>>>> >>>>>>>>>> we try to follow the launch and standards processes to achieve as >>>>>>>>>> much >>>>>>>>>> interop as we can, given other requirements such as privacy and >>>>>>>>>> security. >>>>>>>>>> >>>>>>>>>> Gecko: Shipping >>>>>>>>>> >>>>>>>>>> WebKit: Shipping >>>>>>>>>> >>>>>>>>>> Web developers: Mixed Signals >>>>>>>>>> >>>>>>>>>> As one of the most impactful changes to the web platform in a >>>>>>>>>> long time, the deprecation of 3rd party cookies and the introduction >>>>>>>>>> of >>>>>>>>>> alternative APIs have received a lot of helpful feedback from web >>>>>>>>>> developers to an extent impossible to summarize in a few sentences. >>>>>>>>>> As >>>>>>>>>> described in the summary, the Privacy Sandbox wants to ensure that a >>>>>>>>>> vibrant, freely accessible web can exist even as we roll out strong >>>>>>>>>> user >>>>>>>>>> protections and we will continue to work with web developers to >>>>>>>>>> understand >>>>>>>>>> their use cases and ship the right (privacy-preserving) APIs. And >>>>>>>>>> we’ve >>>>>>>>>> received feedback >>>>>>>>>> <https://privacysandbox.com/news/privacy-sandbox-for-the-web-reaches-general-availability/#:~:text=The%20Benefits%20of%20Collaboration> >>>>>>>>>> >>>>>>>>>> that gives us confidence that we’re on the right track. >>>>>>>>>> >>>>>>>>>> WebView application risks >>>>>>>>>> >>>>>>>>>> This deprecation will not affect WebView for now. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Debuggability >>>>>>>>>> >>>>>>>>>> Developers may use the command-line testing switch >>>>>>>>>> --test-third-party-cookie-phaseout >>>>>>>>>> (available starting Chrome 115) or enable >>>>>>>>>> chrome://flags#test-third-party-cookie-phaseout (available >>>>>>>>>> starting Chrome 117), to simulate browser behavior with default >>>>>>>>>> access to >>>>>>>>>> third-party cookies removed. We also started reporting DevTools >>>>>>>>>> issues for >>>>>>>>>> cookies impacted by the deprecation starting in Chrome 117 to help >>>>>>>>>> identify >>>>>>>>>> potentially impacted workflows. We are continuing to improve our >>>>>>>>>> developer >>>>>>>>>> documentation >>>>>>>>>> <https://developer.chrome.com/blog/cookie-countdown-2023oct/> on >>>>>>>>>> debugging third-party cookies usage, and guidance on migration to >>>>>>>>>> new APIs. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>>>> ? >>>>>>>>>> >>>>>>>>>> Yes. We have put together a set of WPTs >>>>>>>>>> <https://wpt.fyi/results/cookies/third-party-cookies/third-party-cookies.tentative.https.html?label=experimental&label=master&aligned> >>>>>>>>>> >>>>>>>>>> which cover third-party cookie blocking for subresource requests. It >>>>>>>>>> is not >>>>>>>>>> yet comprehensive, we are working on adding additional tests to >>>>>>>>>> support our >>>>>>>>>> standardization efforts. >>>>>>>>>> >>>>>>>>>> Flag name on chrome://flags >>>>>>>>>> >>>>>>>>>> TestThirdPartyCookiePhaseout >>>>>>>>>> >>>>>>>>>> Finch feature name >>>>>>>>>> >>>>>>>>>> Due to the nature of the Chrome-facilitated testing period >>>>>>>>>> <https://developer.chrome.com/docs/privacy-sandbox/chrome-testing/>, >>>>>>>>>> as well as the general complexity of managing breakage related to >>>>>>>>>> removing >>>>>>>>>> third-party cookies, there won’t be a single Finch feature that >>>>>>>>>> takes us >>>>>>>>>> from 0% to 100% deprecated. Instead, a collection of features, >>>>>>>>>> supporting >>>>>>>>>> different phases and components, will be used. >>>>>>>>>> >>>>>>>>>> Non-finch justification >>>>>>>>>> >>>>>>>>>> N/A >>>>>>>>>> >>>>>>>>>> Requires code in //chrome? >>>>>>>>>> >>>>>>>>>> No, the base third-party cookie blocking functionality does not >>>>>>>>>> require Chrome code. Some custom Chrome functionality (such as the >>>>>>>>>> aforementioned facilitated testing, mitigations and user experience >>>>>>>>>> improvements) does require it. >>>>>>>>>> >>>>>>>>>> Estimated milestones >>>>>>>>>> >>>>>>>>>> Initial phase of Deprecation (1%) is planned as part of the >>>>>>>>>> “Chrome facilitated testing period” beginning in Q1 2024, as >>>>>>>>>> described on >>>>>>>>>> https://privacysandbox.com/open-web/#the-privacy-sandbox-timeline, >>>>>>>>>> further phaseout is planned to begin in Q3 2024. (The gradual >>>>>>>>>> phaseout of >>>>>>>>>> third-party cookies is subject to addressing any remaining >>>>>>>>>> competition >>>>>>>>>> concerns of the CMA.) >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>> >>>>>>>>>> https://chromestatus.com/feature/5133113939722240 >>>>>>>>>> >>>>>>>>>> This intent message was generated by Chrome Platform Status >>>>>>>>>> <https://chromestatus.com/>. >>>>>>>>>> >>>>>>>>> -- >>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>>>> send an email to blink-dev+...@chromium.org. >>>>>>>>>> To view this discussion on the web visit >>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ikogMJZce42o-QcGUMDNiM2Lr_6BGAfP8Gzktakc5_fw%40mail.gmail.com >>>>>>>>>> >>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ikogMJZce42o-QcGUMDNiM2Lr_6BGAfP8Gzktakc5_fw%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>> . >>>>>>>>>> >>>>>>>>> -- >>>>>> You received this message because you are subscribed to the Google >>>>>> Groups "blink-dev" group. >>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>> send an email to blink-dev+...@chromium.org. >>>>>> To view this discussion on the web visit >>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1d705388-c7ff-46ad-9d4e-db6276b8035an%40chromium.org >>>>>> >>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1d705388-c7ff-46ad-9d4e-db6276b8035an%40chromium.org?utm_medium=email&utm_source=footer> >>>>>> . >>>>>> >>>>>> -- >>>>> You received this message because you are subscribed to the Google >>>>> Groups "blink-dev" group. >>>>> To unsubscribe from this group and stop receiving emails from it, send >>>>> an email to blink-dev+...@chromium.org. >>>>> >>>> To view this discussion on the web visit >>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ispE4%2Bj-YsxyyxHU%2BGAJ8honiS0feV4zgf_4R_ZJq9MA%40mail.gmail.com >>>>> >>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ispE4%2Bj-YsxyyxHU%2BGAJ8honiS0feV4zgf_4R_ZJq9MA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>> . >>>>> >>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/60ada932-2675-43b0-8c40-a025d799ca16n%40chromium.org.