Hi Mike,

Thank you for the prompt response, and I am sorry for the confusion, I
thought an extension for up to 6 milestones is possible.

The OT expires in 133, so I would like to extend it to 136.

Thank you,
Mohamed

On Tue, Jan 14, 2025 at 4:30 PM Mike Taylor <miketa...@chromium.org> wrote:

> Hi Sam,
>
> Can you clarify what milestones you're requesting the extension for? Is it
> 134 to 139?
>
> I see evidence of substantial progress which is great, but an OT can only
> be renewed for up to 3 milestones.
>
> thanks,
> Mike
> On 1/14/25 10:22 AM, Chromestatus wrote:
>
> Contact emails rby...@chromium.org, g...@chromium.org, ma...@chromium.org
>
> Explainer
> https://github.com/WICG/digital-credentials/blob/main/explainer.md
>
> Specification https://wicg.github.io/digital-credentials
>
> Summary
>
> Websites can and do get credentials from mobile wallet apps through a
> variety of mechanisms today (custom URL handlers, QR code scanning, etc.).
> This Web Platform feature would allow sites to request identity information
> from wallets via Android's IdentityCredential CredMan system. It is
> extensible to support multiple credential formats (eg. ISO mDoc and W3C
> verifiable credential) and allows multiple wallet apps to be used.
> Mechanisms are being added to help reduce the risk of ecosystem-scale abuse
> of real-world identity (see
> https://docs.google.com/document/u/1/d/1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit).
>
>
>
> Blink component Blink>Identity>DigitalCredentials
> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EDigitalCredentials%22>
>
> TAG review Mozilla feedback from Martin (also on the TAG) suggests we
> need to invest more in the threat model for the larger space and clarify
> specific privacy mitigations before shipping or requesting TAG review.
>
> TAG review status Pending
>
> Origin Trial Name Digital Credentials API
>
> Chromium Trial Name WebIdentityDigitalCredentials
>
> Origin Trial documentation link https://wicg.github.io/digital-credentials
>
> WebFeature UseCounter name kIdentityDigitalCredentials
>
> Risks
>
>
> Interoperability and Compatibility
>
> There are multiple standards efforts involved here. We have been working
> with WebKit and Mozilla in the WICG on defining this specific API. But the
> greater interoperability risk will come from the data that is sent and
> returned via this API. Details of that are still in discussions but mostly
> driven outside the web browser community in the OpenID Foundation (eg.
> OpenID4VP:
> https://openid.net/specs/openid-4-verifiable-presentations-1_0.html) and
> ISO (18013-7 "mdoc": https://www.iso.org/standard/82772.html)
>
>
> *Gecko*: Negative (
> https://github.com/mozilla/standards-positions/issues/1003) We share most
> of Mozilla's concerns and continue to work with them (and the broader
> community) on mitigations. I believe we feel greater risk for the
> established practice of custom schemes becoming prevalent than Mozilla does
> (eg. due to Google being mandated by eIDAS regulation to accept EUDI
> credentials).
>
> *WebKit*: In development (
> https://github.com/WebKit/standards-positions/issues/332) WebKit
> implementation progress: https://bugs.webkit.org/show_bug.cgi?id=268516
>
> *Web developers*: No signals
>
> *Other signals*: This work in the W3C PING is relevant:
> https://github.com/w3cping/credential-considerations/
>
> Ergonomics
>
> There's a possibility that these credentials will be used alongside other
> types of credentials in the future - such as optionally minting a passkey
> when a digital credential is used to sign up for a site, or by allowing
> sign-up with either a digital credential or a federated credential via
> FedCM. As such we argued it was best to put this work in the context of the
> Credential Management API, and hence the support is added in
> 'navigator.identity.get() API .
>
>
> Activation
>
> The primary activation concern is enabling existing deployments using
> technology like OpenID4VP to be able to also support this API. As such we
> have left the request protocol unspecified at this layer, to be specified
> along with existing request protocols to maximize activation opportunity.
>
>
> Security
>
> See
> https://github.com/WICG/digital-credentials/blob/main/horizontal-reviews/security-privacy.md
> and https://github.com/WICG/digital-credentials/issues/115
>
>
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that
> it has potentially high risk for Android WebView-based applications?
>
>
> Goals for experimentation
>
> Reason this experiment is being extended
>
> I'd like to request permission to extend an OT for this API. The
> experiment has been running for Android only so far, but in the meanwhile:
> 1- There has been progress on the spec
> https://wicg.github.io/digital-credentials/ and it is expected to
> graduate to the FedID WG soon. 2- We have added Desktop cross-device
> support. Therefore, we are requesting the extension.
>
>
> Ongoing technical constraints
>
> None
>
>
> Debuggability
>
> None necessary - just new JS API. For testing we may want to add a
> developer option to provide a fake wallet (as for the devtools fake
> authenticator for WebAuthn), but this is not urgent.
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac,
> Linux, ChromeOS, Android, and Android WebView)? No
>
> Android and Desktop Only
>
>
> Is this feature fully tested by web-platform-tests
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ? Yes
>
>
> https://wpt.fyi/results/digital-credentials?label=master&label=experimental&aligned
>
>
> DevTrial instructions
> https://github.com/WICG/digital-identities/wiki/HOWTO%3A-Try-the-Prototype-API-in-Chrome-Android
>
> Flag name on about://flags web-identity-digital-credentials
>
> Finch feature name WebIdentityDigitalCredentials
>
> Requires code in //chrome? True
>
> Tracking bug https://issues.chromium.org/issues/40257092
>
> Launch bug https://launch.corp.google.com/launch/4268575
>
> Estimated milestones
> Origin trial desktop first 134
> Origin trial desktop last 139
> Origin trial extension 1 end milestone 139
> Origin trial Android first 128
> Origin trial Android last 133
> DevTrial on Android 119
>
> Link to entry on the Chrome Platform Status
> https://chromestatus.com/feature/5166035265650688?gate=5119315604668416
>
> Links to previous Intent discussions Intent to Prototype:
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL9PXLx3sHWmdE-ikAEDay_S3ijf0%2BfxB_LbsuOx8YJx%2BZA7%2Bg%40mail.gmail.com
> Intent to Experiment:
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-421uDmu2WNDBG5bYRSWAhfmahsHPVjDwN5NLkUdCkvw%40mail.gmail.com
>
>
> This intent message was generated by Chrome Platform Status
> <https://chromestatus.com>.
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com?utm_medium=email&utm_source=footer>
> .
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOZU3iG2H8CPEtw02yxzBD0GZTVGjGHeB1cNPD4q62XsXOnCxQ%40mail.gmail.com.

Reply via email to