Done I think?

~ Ari Chivukula (Their/There/They're)


On Wed, Sep 11, 2024 at 8:32 AM Yoav Weiss (@Shopify) <
yoavwe...@chromium.org> wrote:

> Could you flip the required review bits in the chromestatus tool?
>
> On Monday, September 9, 2024 at 2:58:19 PM UTC+2 Ari Chivukula wrote:
>
>> Contact emails
>>
>> aric...@chromium.org, kaustub...@chromium.org, sval...@chromium.org,
>> ayk...@google.com, nick...@google.com
>>
>> Specification
>>
>> https://github.com/WICG/trust-token-api/pull/306
>>
>> Summary
>>
>> Access to the Private State Token API
>> <https://wicg.github.io/trust-token-api/> is gated by Permissions Policy
>> <https://www.w3.org/TR/permissions-policy/> features. We proposed to
>> update the default allowlist
>> <https://w3c.github.io/webappsec-permissions-policy/#policy-controlled-feature-default-allowlist>
>> for both `private-state-token-issuance
>> <https://wicg.github.io/trust-token-api/#policy-controlled-feature-private-state-token-issuance>`
>> and `private-state-token-redemption
>> <https://wicg.github.io/trust-token-api/#policy-controlled-feature-private-state-token-redemption>`
>> features from self to * (wildcard).
>>
>>
>> Blink component
>>
>> Blink>StorageAccessAPI
>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EStorageAccessAPI>
>>
>>
>> Motivation
>>
>> The Private State Tokens API <https://wicg.github.io/trust-token-api/>
>> has received recurring feedback from developers
>> <https://github.com/WICG/trust-token-api/issues/106> that the current
>> requirement to have first-party sites opt-in to allow third-parties to
>> invoke token issuance and redemption operations is not practical. This is
>> especially true for use cases where embeds don’t have first-party script
>> access to either execute the operations directly in first-party context, or
>> to enable the permission policies on the relevant frames. Current default
>> requires every site to update permission policy for iframes that embed
>> invalid traffic (IVT) detection scripts.Since scale and coverage are of
>> essence for IVT detection that rely on identifying outlier patterns; the
>> need for coordination with first-parties places a high cost for successful
>> adoption.
>>
>> TAG review
>>
>> https://github.com/w3ctag/design-reviews/issues/990
>>
>> Compatibility
>>
>> This will not break any existing Private State Token API usage as it only
>> increases permissiveness. As usage increases, sites may need to consider
>> the need to mitigate issuer exhaustion
>> <https://wicg.github.io/trust-token-api/#issuer-exhaustion>.
>>
>> Competing scripts might race to call hasPrivateToken to ensure their
>> preferred issuer enters the issuerAssociations
>> <https://wicg.github.io/trust-token-api/#issuerassociations> map
>> <https://infra.spec.whatwg.org/#ordered-map> before the issuer of others
>> given a limit of two per top-level origin
>> <https://html.spec.whatwg.org/multipage/webappapis.html#concept-environment-top-level-origin>.
>> To control this process, the top-level origin
>> <https://html.spec.whatwg.org/multipage/webappapis.html#concept-environment-top-level-origin>
>> could call hasPrivateToken up to twice before any other JavaScript is
>> included to ensure their preferred issuers are available.
>>
>> Few enough websites
>> <https://chromestatus.com/metrics/feature/timeline/popularity/3277> are
>> using the API that we believe we can broaden the default permission set and
>> not open any concerning new avenues of attack.
>>
>>
>> Interoperability
>>
>> Gecko: Position Requested
>> <https://github.com/mozilla/standards-positions/issues/1066>
>>
>> WebKit: Position Requested
>> <https://github.com/WebKit/standards-positions/issues/391>
>>
>> Web developers: Positive
>> <https://github.com/WICG/trust-token-api/issues/106>
>>
>> Debuggability
>>
>> Storage written can be examined in devtools.
>>
>> Is this feature fully tested by web-platform-tests?
>>
>> Yes
>> <https://source.chromium.org/chromium/chromium/src/+/main:third_party/blink/web_tests/external/wpt/trust-tokens/>
>>
>> Tracking bug
>>
>> https://issues.chromium.org/353738486
>>
>> Link to entry on the Chrome Platform Status
>>
>> https://chromestatus.com/feature/5205548434456576
>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGpy5D%2BEF-APNnPy3Qx%3D5cZug_CJevZ2yqazk_EuUhCzcs3Kyg%40mail.gmail.com.

Reply via email to