-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify section 3.14 and add Third Party Tracking as an opt-in threat model #7
Comments
I agree that "Does this specification distinguish between behavior in first-party and third-party contexts?" is not strong enough but OTOH, @mikeperry-tor's examples sound more like an issue with browser implementation than the feature specification itself. Perhaps I'm not understanding - are there examples of features that prevent techniques like double-keying at the specification level? |
I am in favor of this addition. |
Typically they tend to impede compatible, gracefully degrading implementations of these techniques through neglect of treatment of third party tracking. This leads website developers to create sites that rely on a particular type of functionality behaving in a way that is incompatible with isolation in unpredictable and/or breakage-inducing ways. Four examples:
Let me know when any pull requests should be submitted, and what form they should take. |
An example of doing this (comparatively) well in a spec is Canvas, which has the origin-clean flag http://www.w3.org/TR/html5/scripting-1.html#security-with-canvas-elements. The only issue I have with it is that it says the flag MUST start as 'true', whereas someone might want to default it to false (thereby making the canvas unreadable). I had thought that privacy mode might be one thing that took advantage of these kinds of hooks in the specs to give users control. It probably isn't the right thing to do this with, but there could eventually be some sort of mode like it -- either in the standards our outside of them (like TorBrowser has done) that takes advantage of them. So, +1 from me, even if browsers don't surface controls immediately, having these controls in the specs is important. WRT H2 connection coalescing and similar things - this is actually being discussed right now, see w3c/resource-hints#32. |
@mikeperry-tor Thanks, you can submit pull requests at any time to this repo. The earlier the better since some specs are already using this doc for review, ex: #1 |
Hello. Tough one. But I want to dust-off and move the SP-Q forward at some point. To simplify this point (and discussion above, and sorry for not treating the point as the core element of the questionnaire), I'll include:
|
Migrated from mikewest/spec-questionnaire#6
@mikeperry-tor wrote:
@marcoscaceres commented:
The text was updated successfully, but these errors were encountered: