-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scaling issues with non-automated verification process #48
Comments
Hi @rhiaro - I'd like to bring your attention to this expanded proposal for the UA policy that we published since your feedback on PR #45; and I hope that it provides answers to your questions.
Our proposal is indeed that all UAs come to agreement on the policy, and pull from the same list (see Responsibilities of the User Agent for more). The policy is inspired from prior art in the ecosystem, such as the definition of "party" in the DNT specification which was published as a W3C Candidate Recommendation in 2016; so we are hopeful that we can at least come to rough consensus on the principles, and then work through smaller/specific objections as they come up. You also pointed out concerns about centralization, and scalability. Regarding the centralization concern, I was curious if you think that the challenges here are substantially different from the lists that are used elsewhere in the web platform, such as the Public Suffix List, or HSTS Preload list? Or perhaps the feedback is based on issues you've seen with those lists? The "Responsibilities of the User Agent" section that I cited above intends to address some of the existing challenges with those lists. Regarding the scalability concern, we hope that our expanded UA policy proposal alleviates this. Specifically, if you look at the section on the responsibilities of the enforcement entity, we are proposing that the entity doesn't have to check every single request manually, but only perform random spot checks. Technical consistency checks will be indeed be performed on each request however; and to the extent possible, we would like to automate as many checks as possible. If I understand correctly, I believe that the TAG's preferences are around a technical-only mechanism. In fact, that is exactly where we started with the original version of this proposal. However, we eventually introduced the UA policy to address concerns around potential for abuse, which was pointed out to us by other browsers in #6 and #7. A technical-only mechanism was also contrasted with the analogous Disconnect Entities list that is currently used by Firefox and Edge in their default Tracking Protection modes. This list is curated based on a policy that is documented here, and you will see some similarities around how tracking is defined as (emphasis mine) "the collection of data regarding a particular user's or device's activity across multiple websites or applications that aren’t owned by the data collector, and the retention, use or sharing of that data.". We hope to strike a balance between scalability, and abuse-resistance by having acceptances primarily based on self-attestations and technical checks; along with supplemental accountability measures such as a publicly auditable log, random spot checks, and a mechanism for users and civil society to report potentially invalid or policy-violating sets. We think that the public self-attestations will play an important role in deterring abuse, because as footnote#1 in this section points out, "[Public] Misrepresentations about an entity's ownership/control of a site that lead to the collection of user data outside of the First Party Sets policy would be enforceable in the same way that misrepresentations or misleading statements in privacy policies are." |
Add IEE role in surveys of users to check that they understand common identity. (It would be impractical to leave this to the browser and site author, especially in cases where the browser and site author have a business relationship that would be influenced by FPS validity or invalidity.) Refs WICG#43 WICG#48 WICG#64 WICG#76
@rhiaro - I think my previous answer is due for an update. We significantly updated this proposal based on ecosystem feedback (summary in #92).
Please let us know if you see any unresolved issues with the latest version of the proposal. |
Opening this issue to capture feedback from TAG member, @rhiaro:
The text was updated successfully, but these errors were encountered: