On Tue, Sep 9, 2025 at 12:48 PM Daniel Bratell <bratel...@gmail.com> wrote:

> I was thinking about that when reading the explainer, and I can see why
> not doing it initially. If you are signing up for an account at
> www.possibly-malicious.site it could be scary to have something asking
> for your email password. Such questions could also make it easier for
> www.really-malicious.site to trick a user to hand over their email
> password to the wrong party.
>
> It is certainly possible, but it would also add complexity and risks.
>

Yeah, signing-in to the email provider can open a lot of challenges.
Doesn't seem like we are cornering ourselves, but yeah, probably simplifies
a bunch if we assume that the user is already logged in to the email
provider.


> /Daniel
> On 2025-09-09 19:22, Reilly Grant wrote:
>
> It would be nice if this could support the case where the user is not
> logged into their email provider (i.e. it could open an authentication page
> if no cookie is present). This matters for email providers that don't use a
> web-based client. For example, since I access my email with Thunderbird
> there's no cookie in my browser related to my email provider.
> Reilly Grant | Software Engineer | reil...@chromium.org | Google Chrome
> <https://www.google.com/chrome>
>
>
> On Tue, Sep 9, 2025 at 9:11 AM Sam Goto <g...@google.com> wrote:
>
>>
>>
>> On Tue, Sep 9, 2025 at 8:24 AM Daniel Bratell <bratel...@gmail.com>
>> wrote:
>>
>>> That seems to be a major hurdle for this, unless every mail provider in
>>> the world sets up an email verification service
>>>
>> Yeah, this presupposes that email servers are going to be exporting this
>> email verification service, which is a big if.
>>
>>> , sites will have to maintain two code paths for email verification.
>>>
>> Yeah, same goes for websites: it requires them to add support for it too,
>> so it certainly comes at a cost.
>>
>> I do think that the benefits outweigh the costs, at least for a
>> meaningful part of websites, that can help enough users.
>>
>> Hard to know at the moment, so I'll keep an eye on the cost/benefit ratio
>> for websites and see if we are striking the right balance, but that's part
>> of the hypothesis that we are trying to test in this intent to prototype.
>>
>>> it also requires the user to be logged in to some kind of webmail
>>> service for their email in the browser they are using, with authentication
>>> handled by cookies, and for the verification site to be the same
>>> domain/site as the webmail so that those cookies are sent.  It seems to
>>> require a lot of things to be just right to be as smooth as envisioned.
>>>
>> It does indeed require the user to be logged in.
>>
>> You are right that it requires a lot of things to go right before it can
>> provide value, but I think the key insight here is that this progressively
>> enhances the status quo, without requiring any user behavioral change.
>> Meaning, if none of the stars align (e.g. the email provider provides the
>> service, the website supports the cryptographic proof and the user is
>> logged in), the user just goes through what they were already going through
>> with no behavioral change. But when the stars do align, they have a better
>> time. So, a strict win, with no losses (other than the implementation cost)
>> when it isn't available.
>>
>>> (The spec could use more characters by the way, not everything needs to
>>> be 3 letters long, kty, alg, typ, iat, cnf, jwp, iss, aud, evp, ...)
>>>
>> All of these are coming from the JWT/SD-JWT+KB RFC, so a convention that
>> is already in place and time-tested by developers deploying variations of
>> OAuth.
>>
>>> /Daniel
>>> On 2025-09-08 21:43, Reilly Grant wrote:
>>>
>>> There's been some discussion recently on chromium-dev@ about a new
>>> phone number verification mechanism using flash calls. I'm curious if
>>> there's interest in expanding this work on email verification to include
>>> both email addresses and phone numbers.
>>>
>>> Unrelatedly, as someone who hosts their own email I'm curious if there
>>> are reference implementations available for the email provider side of this
>>> system. I'd love to play around with this API and want to be sure it's not
>>> limited to users of the major email providers.
>>> Reilly Grant | Software Engineer | reil...@chromium.org | Google Chrome
>>> <https://www.google.com/chrome>
>>>
>>>
>>> On Fri, Sep 5, 2025 at 4:52 PM Chromestatus <
>>> ad...@cr-status.appspotmail.com> wrote:
>>>
>>>> Contact emails g...@google.com
>>>>
>>>> Explainer https://github.com/dickhardt/email-verification-protocol
>>>>
>>>> Specification None
>>>>
>>>> Summary
>>>>
>>>> The EVP (email verification protocol) helps users create, access and
>>>> recover accounts by providing cryptographic proof that they own an email
>>>> address, rather than having to manually verify email addresses with magic
>>>> links. https://github.com/dickhardt/email-verification-protocol
>>>>
>>>>
>>>> Blink component Blink>Identity
>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%22>
>>>>
>>>> Web Feature ID Missing feature
>>>>
>>>> Motivation
>>>>
>>>> Verifying email addresses on the web today involves receiving magic
>>>> link and proving that you have access to the email inbox. This is
>>>> cumbersome for users and inefficient for developers: emails can take a
>>>> while to arrive, can get into SPAM folders and users have to switch
>>>> applications to verify them.
>>>>
>>>>
>>>> Initial public proposal
>>>> https://github.com/dickhardt/email-verification-protocol
>>>>
>>>> TAG review None
>>>>
>>>> TAG review status Pending
>>>>
>>>> Risks
>>>>
>>>>
>>>> Interoperability and Compatibility
>>>>
>>>> None
>>>>
>>>>
>>>> *Gecko*: No signal
>>>>
>>>> *WebKit*: No signal
>>>>
>>>> *Web developers*: No signals
>>>>
>>>> *Other signals*:
>>>>
>>>> WebView application risks
>>>>
>>>> Does this intent deprecate or change behavior of existing APIs, such
>>>> that it has potentially high risk for Android WebView-based applications?
>>>>
>>>> None
>>>>
>>>>
>>>> Debuggability
>>>>
>>>> None
>>>>
>>>>
>>>> Is this feature fully tested by web-platform-tests
>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>> ? No
>>>>
>>>> Flag name on about://flags None
>>>>
>>>> Finch feature name None
>>>>
>>>> Non-finch justification None
>>>>
>>>> Requires code in //chrome? False
>>>>
>>>> Estimated milestones
>>>>
>>>> No milestones specified
>>>>
>>>>
>>>> Link to entry on the Chrome Platform Status
>>>> https://chromestatus.com/feature/5205725253074944?gate=5165657771606016
>>>>
>>>> This intent message was generated by Chrome Platform Status
>>>> <https://chromestatus.com>.
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>> To view this discussion visit
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/68bb77c8.050a0220.257801.0191.GAE%40google.com
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/68bb77c8.050a0220.257801.0191.GAE%40google.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>> --
>>> You received this message because you are subscribed to the Google
>>> Groups "blink-dev" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to blink-dev+unsubscr...@chromium.org.
>>> To view this discussion visit
>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEmk%3DMbiA47vS6bxcjChRrsHVSgOhPzBLC0ymng7-gPoOefs2A%40mail.gmail.com
>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEmk%3DMbiA47vS6bxcjChRrsHVSgOhPzBLC0ymng7-gPoOefs2A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAMtUnc6tit4yHzbSkDOBDM-U49U4T7QLHf9F%2Br37%3D1y7N9SYkg%40mail.gmail.com.

Reply via email to