LGTM1

I think this strikes the right balance between protecting users from known trackers and the ability to detect fraud and abuse. I'm not sure that 10% reveal after 24 hours is the magic recipe, but appreciate that these are configurable such that the team will be able to adapt to feedback / new information.

aside: I don't think we need to block on TAG review here, but encourage the team to follow up with the relevant IETF groups to get a broader review on the design.

On 8/1/25 12:48 p.m., 'Theodore Olsauskas-Warren' via blink-dev wrote:

Thanks for the feedback, Reilly. While the original IP Protection feature’s TAG review covers some ground on PRTs, you’re right that it’s possible the TAG may want to weigh in differently on PRTs specifically as opposed to IP Protection generally. We’ve filed a TAG request here <https://github.com/w3ctag/design-reviews/issues/1125>.


At the same time, we also recognize that the protocol introduced here is likely best reviewed in an IETF forum, and would just flag for reviewers that we do hope to pursue discussions at IETF 124 this fall.


Theo.

On Tuesday, July 29, 2025 at 11:13:10 AM UTC-7 Reilly Grant wrote:

    Can you request a separate TAG review for this feature? The TAG's
    response to the IP protection review request seemed to be about
    standardizing the complete system. However this individual piece
    could be adopted by other browsers even if their particular
    implementations of a complete IP protection system are
    implementation-specific.
    Reilly Grant | Software Engineer |rei...@chromium.org |Google
    Chrome <https://www.google.com/chrome>


    On Mon, Jul 28, 2025 at 1:52 PM 'Theodore Olsauskas-Warren' via
    blink-dev <blin...@chromium.org> wrote:


                Contact emails

        sau...@google.com, las...@google.com, nic...@google.com,
        erict...@chromium.org, ryan...@google.com, ayk...@google.com


                Explainer

        https://github.com/GoogleChrome/ip-protection/blob/main/prt_explainer.md
        
<https://github.com/GoogleChrome/ip-protection/blob/main/prt_explainer.md>


                Specification

        https://datatracker.ietf.org/doc/html/draft-pfeiffenberger-prtokens-00
        <https://datatracker.ietf.org/doc/html/draft-pfeiffenberger-prtokens-00>


                Summary

        To enable businesses to estimate the amount of fraud on their
        systems, train models to defend against fraud, and analyze
        emerging fraudulent behavior while still mitigating the
        ability to track users at scale using IP addresses, we propose
        the introduction of a delayed IP sampling mechanism called
        Probabilistic Reveal Tokens (PRTs) alongside IP Protection for
        use in proxied traffic. Chrome plans to launch IP Protection
        <https://github.com/GoogleChrome/ip-protection>in incognito
        mode later this year.


        PRTs will be included on proxied requests in a new HTTP header
        added by the browser for domains that indicate they want to
        receive them via a signup process. Each PRT contains a
        ciphertext, generated by an Issuer and re-randomized by the
        browser for unlinkability prior to the request, that the
        recipient can decrypt after a delay. Google will be the issuer
        for Chrome's implementation. A minority of the decrypted PRTs
        contain the client's pre-proxy IP address (i.e. non-masked,
        and as observed by the token issuer), while the remaining PRTs
        provide no information about the client's original IP address.
        This results in only a small percent of PRTs containing and
        revealing the user's IP.


        Our explainer introduces key tunable parameters
        
<https://github.com/GoogleChrome/ip-protection/blob/main/prt_explainer.md#tunable-parameters>for
        this proposal:

         *

            Reveal rate: the percentage of the time that the tokens
            are revealed

         *

            Epoch and delay period length: the periods after which
            tokens are made available


        We will initially set reveal rate to 10% and epoch and delay
        period length both to 24 hours each.


        Developers that want to receive PRTs will need to request them
        at console.privacysandbox.google.com
        <https://console.privacysandbox.google.com>. Sign ups will
        open when PRTs are available in pre-Stable channels.


                Blink component

        Privacy>Fingerprinting>IPProtection
        
<https://issues.chromium.org/issues?q=customfield1222907:%22Privacy%3EFingerprinting%3EIPProtection%22>


                TAG review

        The IP Protection TAG review, for which this feature is
        closely tied, was closed by the TAG as “Resolution: Decline”
        (https://github.com/w3ctag/design-reviews/issues/1083)


                TAG review status

        Resolution Decline


                Risks



                Interoperability and Compatibility

        None



        Gecko: No signal
        (https://github.com/mozilla/standards-positions/issues/1273
        <https://github.com/mozilla/standards-positions/issues/1273>)


        WebKit: No signal
        (https://github.com/WebKit/standards-positions/issues/529
        <https://github.com/WebKit/standards-positions/issues/529>)


        Web developers: Positive signal from invalid traffic detection
        providers, though open questions
        <https://github.com/GoogleChrome/ip-protection/issues/81>remain
        about the impact on fraud detection with initial parameter
        settings. As IP Protection launches, we’ll continue to solicit
        feedback.


        Other signals:


                WebView application risks

        Does this intent deprecate or change behavior of existing
        APIs, such that it has potentially high risk for Android
        WebView-based applications?

        None



                Debuggability

        Attached PRTs are visible in the Chrome DevTools Network panel.



                Will this feature be supported on all six Blink
                platforms (Windows, Mac, Linux, ChromeOS, Android, and
                Android WebView)?

        No, supported everywhere IP Protection is supported (no WebView).



                Is this feature fully tested by web-platform-tests
                
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>?

        No, as there is no browser API for actuating PRTs (only a
        header attached as part of IP Protection), we don’t plan to
        add any.



                DevTrial instructions

        
https://github.com/explainers-by-googlers/prtoken-reference/blob/main/prt_dev_testing.md
        
<https://github.com/explainers-by-googlers/prtoken-reference/blob/main/prt_dev_testing.md>


                Flag name on about://flags

        None


                Finch feature name

        EnableProbabilisticRevealTokens - Note that there are many
        subtleties to enabling this feature, please see DevTrial
        instructions for enabling locally.


                Rollout plan

        Will ship enabled for all users


                Requires code in //chrome?

        False


                Launch bug

        https://launch.corp.google.com/launch/4367692
        <https://launch.corp.google.com/launch/4367692>


                Estimated milestones

        Shipping on desktop

                

        140

        DevTrial on desktop

                

        138

        Shipping on Android

                

        140

        DevTrial on Android

                

        138



                Anticipated spec changes

        None


                Link to entry on the Chrome Platform Status

        https://chromestatus.com/feature/4914046966693888?gate=6289919137546240
        
<https://chromestatus.com/feature/4914046966693888?gate=6289919137546240>



--
        Theodore Olsauskas-Warren

        Software Engineering Manager

        sau...@google.com

-- You received this message because you are subscribed to the
        Google Groups "blink-dev" group.
        To unsubscribe from this group and stop receiving emails from
        it, send an email to blink-dev+...@chromium.org.
        To view this discussion visit
        
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CA%2B0Xr79QUTJt7bi443Ax5eMD2z%3DCsqV0o4__0tNvqKbMmLb5fg%40mail.gmail.com
        
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CA%2B0Xr79QUTJt7bi443Ax5eMD2z%3DCsqV0o4__0tNvqKbMmLb5fg%40mail.gmail.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/98e6b10c-f5c5-4852-b4b5-ff4da46c43bdn%40chromium.org <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/98e6b10c-f5c5-4852-b4b5-ff4da46c43bdn%40chromium.org?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/28bd6668-bb03-48e0-88b5-d06fa2d1748f%40chromium.org.

Reply via email to