This is now enabled for OT on Linux and ChromeOS as well

On Mon, Feb 3, 2025 at 8:14 PM Mohamed Amir Yosef <ma...@chromium.org>
wrote:

> This is now enabled for OT on Win/Mac. (starting 134) (in addition to
> Android which has been already enabled )
>
> Thank you!
>
> On Tuesday, January 14, 2025 at 6:17:04 PM UTC+1 Rick Byers wrote:
>
>> Whoops, I'm very embarrassed to admit that I told Mohamed that he could
>> request a renewal for 6 milestones. Sorry, my bad!  I expect we'll likely
>> need one more renewal before shipping, but we've got a bunch of progress we
>> anticipate on the specification so hopefully it won't be controversial when
>> we get there.
>>
>> Thank you for the approval for 3 more milestones!
>>
>> Rick
>>
>> On Tue, Jan 14, 2025 at 10:57 AM Mike Taylor <miketa...@chromium.org>
>> wrote:
>>
>>> Thanks - LGTM to extend from M134 to M136.
>>> On 1/14/25 10:41 AM, Mohamed Amir Yosef wrote:
>>>
>>> Hi Mike,
>>>
>>> Thank you for the prompt response, and I am sorry for the confusion, I
>>> thought an extension for up to 6 milestones is possible.
>>>
>>> The OT expires in 133, so I would like to extend it to 136.
>>>
>>> Thank you,
>>> Mohamed
>>>
>>> On Tue, Jan 14, 2025 at 4:30 PM Mike Taylor <miketa...@chromium.org>
>>> wrote:
>>>
>>>> Hi Sam,
>>>>
>>>> Can you clarify what milestones you're requesting the extension for? Is
>>>> it 134 to 139?
>>>>
>>>> I see evidence of substantial progress which is great, but an OT can
>>>> only be renewed for up to 3 milestones.
>>>>
>>>> thanks,
>>>> Mike
>>>> On 1/14/25 10:22 AM, Chromestatus wrote:
>>>>
>>>> Contact emails rby...@chromium.org, g...@chromium.org,
>>>> ma...@chromium.org
>>>>
>>>> Explainer
>>>> https://github.com/WICG/digital-credentials/blob/main/explainer.md
>>>>
>>>> Specification https://wicg.github.io/digital-credentials
>>>>
>>>> Summary
>>>>
>>>> Websites can and do get credentials from mobile wallet apps through a
>>>> variety of mechanisms today (custom URL handlers, QR code scanning, etc.).
>>>> This Web Platform feature would allow sites to request identity information
>>>> from wallets via Android's IdentityCredential CredMan system. It is
>>>> extensible to support multiple credential formats (eg. ISO mDoc and W3C
>>>> verifiable credential) and allows multiple wallet apps to be used.
>>>> Mechanisms are being added to help reduce the risk of ecosystem-scale abuse
>>>> of real-world identity (see
>>>> https://docs.google.com/document/u/1/d/1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit).
>>>>
>>>>
>>>>
>>>> Blink component Blink>Identity>DigitalCredentials
>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EDigitalCredentials%22>
>>>>
>>>> TAG review Mozilla feedback from Martin (also on the TAG) suggests we
>>>> need to invest more in the threat model for the larger space and clarify
>>>> specific privacy mitigations before shipping or requesting TAG review.
>>>>
>>>> TAG review status Pending
>>>>
>>>> Origin Trial Name Digital Credentials API
>>>>
>>>> Chromium Trial Name WebIdentityDigitalCredentials
>>>>
>>>> Origin Trial documentation link
>>>> https://wicg.github.io/digital-credentials
>>>>
>>>> WebFeature UseCounter name kIdentityDigitalCredentials
>>>>
>>>> Risks
>>>>
>>>>
>>>> Interoperability and Compatibility
>>>>
>>>> There are multiple standards efforts involved here. We have been
>>>> working with WebKit and Mozilla in the WICG on defining this specific API.
>>>> But the greater interoperability risk will come from the data that is sent
>>>> and returned via this API. Details of that are still in discussions but
>>>> mostly driven outside the web browser community in the OpenID Foundation
>>>> (eg. OpenID4VP:
>>>> https://openid.net/specs/openid-4-verifiable-presentations-1_0.html)
>>>> and ISO (18013-7 "mdoc": https://www.iso.org/standard/82772.html)
>>>>
>>>>
>>>> *Gecko*: Negative (
>>>> https://github.com/mozilla/standards-positions/issues/1003) We share
>>>> most of Mozilla's concerns and continue to work with them (and the broader
>>>> community) on mitigations. I believe we feel greater risk for the
>>>> established practice of custom schemes becoming prevalent than Mozilla does
>>>> (eg. due to Google being mandated by eIDAS regulation to accept EUDI
>>>> credentials).
>>>>
>>>> *WebKit*: In development (
>>>> https://github.com/WebKit/standards-positions/issues/332) WebKit
>>>> implementation progress: https://bugs.webkit.org/show_bug.cgi?id=268516
>>>>
>>>> *Web developers*: No signals
>>>>
>>>> *Other signals*: This work in the W3C PING is relevant:
>>>> https://github.com/w3cping/credential-considerations/
>>>>
>>>> Ergonomics
>>>>
>>>> There's a possibility that these credentials will be used alongside
>>>> other types of credentials in the future - such as optionally minting a
>>>> passkey when a digital credential is used to sign up for a site, or by
>>>> allowing sign-up with either a digital credential or a federated credential
>>>> via FedCM. As such we argued it was best to put this work in the context of
>>>> the Credential Management API, and hence the support is added in
>>>> 'navigator.identity.get() API .
>>>>
>>>>
>>>> Activation
>>>>
>>>> The primary activation concern is enabling existing deployments using
>>>> technology like OpenID4VP to be able to also support this API. As such we
>>>> have left the request protocol unspecified at this layer, to be specified
>>>> along with existing request protocols to maximize activation opportunity.
>>>>
>>>>
>>>> Security
>>>>
>>>> See
>>>> https://github.com/WICG/digital-credentials/blob/main/horizontal-reviews/security-privacy.md
>>>> and https://github.com/WICG/digital-credentials/issues/115
>>>>
>>>>
>>>> WebView application risks
>>>>
>>>> Does this intent deprecate or change behavior of existing APIs, such
>>>> that it has potentially high risk for Android WebView-based applications?
>>>>
>>>>
>>>> Goals for experimentation
>>>>
>>>> Reason this experiment is being extended
>>>>
>>>> I'd like to request permission to extend an OT for this API. The
>>>> experiment has been running for Android only so far, but in the meanwhile:
>>>> 1- There has been progress on the spec
>>>> https://wicg.github.io/digital-credentials/ and it is expected to
>>>> graduate to the FedID WG soon. 2- We have added Desktop cross-device
>>>> support. Therefore, we are requesting the extension.
>>>>
>>>>
>>>> Ongoing technical constraints
>>>>
>>>> None
>>>>
>>>>
>>>> Debuggability
>>>>
>>>> None necessary - just new JS API. For testing we may want to add a
>>>> developer option to provide a fake wallet (as for the devtools fake
>>>> authenticator for WebAuthn), but this is not urgent.
>>>>
>>>>
>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? No
>>>>
>>>> Android and Desktop Only
>>>>
>>>>
>>>> Is this feature fully tested by web-platform-tests
>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>> ? Yes
>>>>
>>>>
>>>> https://wpt.fyi/results/digital-credentials?label=master&label=experimental&aligned
>>>>
>>>>
>>>> DevTrial instructions
>>>> https://github.com/WICG/digital-identities/wiki/HOWTO%3A-Try-the-Prototype-API-in-Chrome-Android
>>>>
>>>> Flag name on about://flags web-identity-digital-credentials
>>>>
>>>> Finch feature name WebIdentityDigitalCredentials
>>>>
>>>> Requires code in //chrome? True
>>>>
>>>> Tracking bug https://issues.chromium.org/issues/40257092
>>>>
>>>> Launch bug https://launch.corp.google.com/launch/4268575
>>>>
>>>> Estimated milestones
>>>> Origin trial desktop first 134
>>>> Origin trial desktop last 139
>>>> Origin trial extension 1 end milestone 139
>>>> Origin trial Android first 128
>>>> Origin trial Android last 133
>>>> DevTrial on Android 119
>>>>
>>>> Link to entry on the Chrome Platform Status
>>>> https://chromestatus.com/feature/5166035265650688?gate=5119315604668416
>>>>
>>>> Links to previous Intent discussions Intent to Prototype:
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL9PXLx3sHWmdE-ikAEDay_S3ijf0%2BfxB_LbsuOx8YJx%2BZA7%2Bg%40mail.gmail.com
>>>> Intent to Experiment:
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-421uDmu2WNDBG5bYRSWAhfmahsHPVjDwN5NLkUdCkvw%40mail.gmail.com
>>>>
>>>>
>>>> This intent message was generated by Chrome Platform Status
>>>> <https://chromestatus.com>.
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>> To view this discussion visit
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOZU3iFfQjxL8LWwVS8E_CFw8uVgDgg2_uzMWUp1zVhkZH76NA%40mail.gmail.com.

Reply via email to