-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Technical-only enforcement of "UA Policy"? #43
Comments
It should be possible for anyone to run a crawler to figure out if a set is valid. (I would be interested in collaborating on a crawler project to produce a validation tool and directory of sets. If anyone else is working on a crawler/validator/directory for first party sets, I would appreciate a link.) Three categories of items that a crawler could check:
Common branding resources and guidelines are also clearly necessary, so that a user is aware when they are using sites that share a set. This might include a common set of graphic elements and size at which the elements must be visible -- but there are a11y concerns. We would need to be confident that a user of assistive technologies will be able to recognize when they are using sites that are members of the same set. |
My opinion is that using |
There are also good reasons for sites owned by the same publishing group not to be eligible for the same first-party set. Whether or not two sites can reasonably be parts of a first-party set is more about user-visible branding and expectations of data handling than about ownership structure. (For example, two independently owned radio station sites that are part of the same network and run the same news and talk shows might be part of the same first-party set, but a scientific journal and a local news site that are two divisions of the same corporation might not be.) An crawler could reasonably produce two results from comparing two
|
Make it clear that a site cannot claim first-party set membership and then use ToS or configuration to disallow automated checks by a user agent or independent enforcement entity. An independent enforcement entity may be able to detect that an FPS member domain is handling user data in a manner inconsistent with the shared privacy policy. An FPS in which this occurs may be presumed invalid without waiting to check if other members of the FPS violate their posted policy in the same way. (Many downstream violations of privacy policy, such as email spam and telemarketing, are randomized, or data sets are partitioned. An independent enforcement entity may detect a privacy policy violation by one member of a set but not others that are doing the same thing, and would need to be able to disallow the FPS.) Refs: WICG#43
Make it clear that a site cannot claim first-party set membership and then use ToS or configuration to disallow automated checks by a user agent or independent enforcement entity. An independent enforcement entity may be able to detect that an FPS member domain is handling user data in a manner inconsistent with the shared privacy policy. An FPS in which this occurs may be presumed invalid without waiting to check if other members of the FPS violate their posted policy in the same way. (Many downstream violations of privacy policy, such as email spam and telemarketing, are randomized, or data sets are partitioned. An independent enforcement entity may detect a privacy policy violation by one member of a set but not others that are doing the same thing, and would need to be able to disallow the FPS.) Refs: WICG#43
Common response headers could also help automatic verification of FPS members. A common Permisions-Policy and Consent-Security-Policy should not be too hard to arrange, not only to show common ownership, but also encourage good cross-site security practice. |
Other data points (to help automatic verification) could be:
"indicatesWith" is an array of objects to make it possible to identify the particular record. Browsers/regulators could specify how many and what data points would be necessary to verify a valid set. |
Make it clear that a site cannot claim first-party set membership and then use ToS or configuration to disallow automated checks by a user agent or independent enforcement entity. An independent enforcement entity may be able to detect that an FPS member domain is handling user data in a manner inconsistent with the shared privacy policy. An FPS in which this occurs may be presumed invalid without waiting to check if other members of the FPS violate their posted policy in the same way. (Many downstream violations of privacy policy, such as email spam and telemarketing, are randomized, or data sets are partitioned. An independent enforcement entity may detect a privacy policy violation by one member of a set but not others that are doing the same thing, and would need to be able to disallow the FPS.) Refs: WICG#43
Add IEE role in surveys of users to check that they understand common identity. (It would be impractical to leave this to the browser and site author, especially in cases where the browser and site author have a business relationship that would be influenced by FPS validity or invalidity.) Refs WICG#43 WICG#48 WICG#64 WICG#76
@krgovind and others, way late here: in assessing various options here, was anything considered in which the browser would put something on the screen from a ./well-known resource that would "enforce visual co-branding"? Something that would "extend" the browser bar, like:
Even something that was "obtrusive" that allowed for greater flexibility and decentralization might be preferable for some businesses. With the new RWS Subsets concept, something like this could define a type of subset, and browsers might make different choices about what to allow in terms of storage/network access for those subsets (SAA auto-grants maybe, but other options: maybe Topics API considers all the sites in this type of set if the API is called on one of them, or Interest Group TTL can be reset based on a visit to one of the sites). |
@thegreatfatzby There is a suggestion to check that some common branding element is present in the DOM: #95 (There are probably some good browser-based software testing tools that could be repurposed to check that a specific element is present and viewable, or this might be a good use case for machine vision: render the page in a headless browser and check for common branding elements) The challenge here is a11y though: is the common party or context clear to users who are visiting the site using a variety of assistive technologies? |
@dmarti thanks for the info: Branding Check vs InjectionThink I get the above proposals, but those would not involve the browser actually placing the branding/links/something on the page to "enforce co-branding", right? They would be checking rather than injecting something. I'm thinking something like:
This would be more obtrusive but allowing businesses to make their own choices about site structure with enforced branding might be preferable to choices about your own branding but enforced site structure. AccessibilityThis is an area I'll go dig on, but in the meantime can you help me understand the issue? I'm trying to think through what A11Y cases would be marginally worse (marginal in the economic sense, not size sense) in the case of an additional visual element used to indicate privacy scope. |
@erik-anderson suggested over on the TAG review thread that we consider technical mechanisms in lieu of the "UA Policy" to verify formation of acceptable sets.
The proposal currently calls for a "UA Policy" (relevant issue) to ensure that site-declared sets meet acceptance criteria. This was added to the proposal primarily to address feedback received from Safari (#6) and Mozilla (#7):
Is there a combination of technical mechanisms; along with a revocation mechanism, transparency logs to aid auditability, etc. that could address these concerns?
The text was updated successfully, but these errors were encountered: