-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Figure out the default privacy boundary for the web #1
Comments
There is a collection of ad industry standards that might be worth looking at here. These are not adequate for saying that two origins are on the same side of a privacy boundary, but they do indicate a site's claims about business relationships that are relevant to user data handling. Many sites have an incentive to maintain these files in a correct state. If an industry-standard file is present on two sites but different, or present on one site but not another, then the sites are signaling that they are probably on different sides of a privacy boundary. |
I forgot to mention that the IETF has tried to address an adjacent problem, but didn't succeed: https://datatracker.ietf.org/wg/dbound/about/ and https://github.com/equalsJeffH/dbound#readme. |
As discussed today - we think building on the whatwg def of origin and writing some words around that might be the best approach here. We could write it from the perspective of how new technologies should behave. |
Looking at the discussion, I think we have some ambiguity about what "use the origin for the default privacy boundary" would mean. For example, @darobin said "Any company that can acquire many companies and put them under its domain can freely share data". To make this concrete, say the company owns As @hober said, "The default privacy boundary in terms of deployed content is the site not the origin.", where "site" is defined using the Public Suffix List. That is, BigCo could put its acquisitions at |
My suggestion from the meeting discussion:
|
… privacy/contextual boundary. (#28) This incorporates some ideas from https://github.com/asankah/identity-domains, which distinguishes separate profiles and boundaries a user creates by clearing cookies/storage. It explicitly says that browsers are free to separate contexts more finely than this default and says there's controversy about separating contexts less finely. It drops the blanket statement that automating recognition is always inappropriate. It also removes the explicit mention of email-based cross-context recognition in favor of a more general statement about difficult-to-forge pieces of people's identities. This contributes to #1 but doesn't completely fix it.
Possibly related: what does a user understand as a single "thing" they are interacting with? #44 |
This feels overtaken by events and captured by the rest of the document. |
The origin is the default security boundary for the web. That is, different things within the same origin are expected to be able to interfere with each other, while cross-origin things have to opt into communication. There are some exceptions, like cookies and Chrome's site isolation, but we have consensus that origin isolation is the goal.
A default privacy boundary would, roughly, be the point at which the user (rather than the page) needs to approve communication.
We're currently defaulting to the Public Suffix List for this, but that answer isn't working perfectly. Specifically, the PSL groups origins into sites, and we declare that the site is the privacy boundary. The PSL has known problems, and it's not currently funded well enough to handle wider adoption, especially in potentially-adversarial situations. We might be able to round up the needed extra investment if we so choose.
A variant of First Party Sets might be able to serve as an alternate default privacy boundary.
The text was updated successfully, but these errors were encountered: