-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Registering issuers with browser developers #240
Comments
The registration requirement is a result of a few considerations:
I'll add a spec-work tag to this issue to track adding a note to the spec to reference the UA-specified behavior on "registering" issuers before websites can use them. |
Hi @martinthomson, thanks for pointing out the technical, procedural, and governance hurdles with this idea. After further discussion, we're going to update the registration for Private State Tokens to be in line with the developer enrollment plans for the rest of the Privacy Sandbox work. In particular, instead of policy enforcement through browsers as described in point 3 above (individually, or collectively as in CA/BF), we're developing an approach along the lines of https://developer.chrome.com/blog/announce-enrollment-privacy-sandbox/#attestations: ask developers to make some public attestations about their behavior as API users, and have browsers just ensure that those public statements are being made. There are well-established consequences in much of the world for a company misrepresenting what it does with people's data. |
This attestations idea has some attack modes1 that mean that - until I see details - I can't really comment on whether your plan is going to address the concern. Do you have a concrete design in mind? Footnotes
|
Hey @etrouton what's the latest on the Attestation vs Registration status? As I've been trying to grok this API and it's intended usage, how to test it out, etc, it seems like the Registration requirement is still active. The Registration doc in the spec still indicates a repo to hit to ask for permission, the list there was updated recently, and there are registration requests being dealt with in the last few weeks. |
The current version of the API will continue to require registration, though you can test the API without registering by manually providing key commitments as a command-line flag as described in https://www.chromium.org/updates/trust-token/. |
Hi @thegreatfatzby, we expect registration to continue for the foreseeable future, but are open to feedback on the process and may make some changes as to what we are asking issuers to acknowledge and disclose ( https://github.com/GoogleChrome/private-tokens/blob/main/PST-Registration.md#disclosure-and-acknowledgement). I'm not sure if this answers your question, but we are not requiring currently any broader attestations at the moment. |
I had somehow completely missed that there was some intent to have issuers register with browser vendors.
That's problem 1: the spec isn't clear about this at all. I had assumed that sites would pick (and maybe commit to) an issuer of their choice. After all, the issuer identity is part of the URL that is provided as an argument to
fetch()
.Problem 2 is the bigger one: is this a good idea? Apple does it for PAT too, but that doesn't make it good.
I think that it isn't good and anything that depends on registration needs really careful consideration of alternatives, because building the necessary safeguards (technical, procedural, and governance) is icky.
There are a ton of reasons why using a legally-enforceable contract or similar agreement makes it easier to deploy something like this, but it means that Google now becomes a gatekeeper for the operation of the system. Google has to deal with a bunch of interesting governance questions about how they approve issuers, what rules they apply, how those rules are enforced, and so on. See also CA/BF1.
It means that other browsers need to stand up their own system as well. Then, if there are differences (there will be), sites will shoulder the cost of having to interoperate with browser-specific issuer sets. The anti-competitive effects that come from this seem like they might be tricky to navigate (the usual disclaimers apply). There might even be geopolitical consequences. I don't say this to be alarmist, but because these are potential consequences of building something like this.
Footnotes
I mention CA/BF because there are strong similarities. There we have different policies from different browsers, but because the system somehow manages to operate despite that. Browser policies there tend to be mostly compatible, but it is the CA/BF and the people that work there that produce that consistency that allows the system to function. CA/BF is also a special case and I have strong reservations about the viability of trying to make another system like it. ↩
The text was updated successfully, but these errors were encountered: