LGTM1 based on the UseCounter being very low, but before shipping please update us on whether PayPal is not impacted.
On Wed, Jun 12, 2024 at 10:56 PM 'Aaron Selya' via blink-dev < blink-dev@chromium.org> wrote: > Daniel, > My initial metrics were significantly higher due to the presence of a > cookie named “receive-cookie-deprication”. This is a cookie > <https://developers.google.com/privacy-sandbox/relevance/setup/web/chrome-facilitated-testing#access_the_sec-cookie-deprecation_http_header>, > Google is using to help sites prepare for third-party cookie depreciation. > It does not actually impact site functionality or cause site breakage, > which is what the metrics were designed to try and identify. After > filtering those cookies from the metrics, the usage rate dropped down to > 0.0012% of page loads. This figure was shared as a part of my update on May > 1st. > > My intention with the statement regarding excluding cases from the count, > was to handle a situation where the metrics were being significantly > impacted by a single identifiable case. In which the cookie that triggered > the metrics could be proven to not have an impact on site behavior or cause > breakage. This exact scenario occurred with the > “receive-cookie-deprication” and was part of my justification for filtering > that cookie from the metrics. > > On Wed, Jun 12, 2024 at 7:55 AM Daniel Bratell <bratel...@gmail.com> > wrote: > >> From my point of view, the only concern is web compatibility. We need to >> prove to ourselves that this is web compatible enough to ship and >> unfortunately the use counters are a bit high (0.032%) . You have done >> further analysis so we know that the actual risk is lower than that but is >> it low enough? >> >> You have mentioned that the counter would be lower if certain cases are >> excluded, but I am not sure I understand if that was just informative or if >> you consider giving those sites an exemption? >> >> Since this thread has been going a while I might have misunderstood >> parts, so maybe you can give an update or summary of the web compatibility >> risk? >> >> /Daniel >> >> >> On 2024-06-07 21:44, 'Aaron Selya' via blink-dev wrote: >> >> Devtools updates have landed (see attached screenshot) and are available >> in Canary. >> >> On Thu, Jun 6, 2024 at 9:44 AM Aaron Selya <se...@google.com> wrote: >> >>> I haven't heard back from Paypal yet, I'm planning on following up with >>> them today to see if they have any updates on their testing. >>> >>> Besides hearing back from them, is there any other information that's >>> holding up LGTM? >>> >>> On Thu, May 30, 2024 at 1:53 PM Aaron Selya <se...@google.com> wrote: >>> >>>> @Chris, completed the testing section as requested. >>>> >>>> @Yoav, paypal requested a test site they could use for determining >>>> independently if the feature was activated for their testing. I provided >>>> them with a glitch.me <https://splashy-broadleaf-carp.glitch.me/> site >>>> that shows if an A1->B->A2 embed is receiving cookies set in the top level >>>> site. If I don't hear back from them by the middle of next week, I'll reach >>>> out for a status update from them. >>>> >>>> >>>> >>>> On Wed, May 22, 2024 at 11:39 AM Chris Harrelson <chris...@chromium.org> >>>> wrote: >>>> >>>>> Please also fill out the Testing section on chromestatus.com. >>>>> >>>>> On Wed, May 22, 2024 at 7:50 AM 'Aaron Selya' via blink-dev < >>>>> blink-dev@chromium.org> wrote: >>>>> >>>>>> Had a good initial conversation with them on Monday letting them know >>>>>> about the issue. They're going to do some testing with the feature >>>>>> enabled >>>>>> to try and gauge the impact the feature will have on their backend. I'm >>>>>> hopeful that they'll give us an update by early next week. >>>>>> >>>>>> On Wed, May 22, 2024 at 10:21 AM Yoav Weiss (@Shopify) < >>>>>> yoavwe...@chromium.org> wrote: >>>>>> >>>>>>> Any news from Paypal? >>>>>>> >>>>>>> On Friday, May 3, 2024 at 7:15:58 PM UTC+2 Aaron Selya wrote: >>>>>>> >>>>>>>> Thank you for suggesting a deeper dive into this Yoav as I might >>>>>>>> not have discovered the significant impact that the >>>>>>>> "receive-cookie-deprication" cookies were having on my metrics without >>>>>>>> your >>>>>>>> prompting. >>>>>>>> >>>>>>>> I've reached out to some engineers at Paypal and hopefully they'll >>>>>>>> get back to me sometime next week. >>>>>>>> >>>>>>>> On Fri, May 3, 2024 at 8:50 AM Yoav Weiss (@Shopify) < >>>>>>>> yoavwe...@chromium.org> wrote: >>>>>>>> >>>>>>>>> Thanks for diving into this!! >>>>>>>>> >>>>>>>>> I guess the scariest bit here would be paypal losing a cookie in >>>>>>>>> the redirect. Even if you didn't find a visible impact in your >>>>>>>>> testing, >>>>>>>>> they may not be exhaustive, and breakage there feels riskier than in >>>>>>>>> other >>>>>>>>> mentioned domains. >>>>>>>>> >>>>>>>>> Have you tried to reach out to Paypal folks and see what they say? >>>>>>>>> >>>>>>>>> On Wed, May 1, 2024 at 8:05 PM Aaron Selya <se...@google.com> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>>> My apologies for the delay in following up on this. >>>>>>>>>> >>>>>>>>>> When I finished my initial implementation and got to the point >>>>>>>>>> where I could begin testing, I found that my metrics were being >>>>>>>>>> flooded >>>>>>>>>> with a cookie named, "receive-cookie-deprication". After doing some >>>>>>>>>> research and testing I learned that this cookie is used by sites for >>>>>>>>>> testing the potential impact of third party cookie depreciation but >>>>>>>>>> doesn't >>>>>>>>>> have any impact on website functionality. To get a better sense of >>>>>>>>>> potential breakage, I landed updated metrics that filtered out that >>>>>>>>>> cookie. >>>>>>>>>> I then conducted a manual audit on 10 (of the 104) sites that >>>>>>>>>> indicated a >>>>>>>>>> possible impact with a build of chromium that had the finch flag >>>>>>>>>> turned on. >>>>>>>>>> >>>>>>>>>> I've summarized my findings in this slide deck >>>>>>>>>> <https://docs.google.com/presentation/d/1S2N2vyGDaKAwP-5W5pVYqRNQ1RQndjlq4yVTny6hEIY/edit?usp=sharing> >>>>>>>>>> but I was unable to find a breakage that caused a site to not >>>>>>>>>> perform as >>>>>>>>>> expected from the user's perspective. To be clear, this doesn't mean >>>>>>>>>> that >>>>>>>>>> there won't be breakage that occurs if/when this feature goes live, >>>>>>>>>> only >>>>>>>>>> that I was unable to find an example where the website was unable to >>>>>>>>>> perform as expected. >>>>>>>>>> >>>>>>>>>> Additionally, with the filtering out of the >>>>>>>>>> "receive-cookie-deprication" cookie from the metrics, the >>>>>>>>>> occurrences of an >>>>>>>>>> A1->B-A2 cookie which this change would impact drops from 0.032% of >>>>>>>>>> overall >>>>>>>>>> page loads to 0.0012% of overall page loads. >>>>>>>>>> >>>>>>>>> >>>>>>>>> That's extremely reassuring! >>>>>>>>> >>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Tue, Mar 19, 2024 at 12:05 PM Aaron Selya <se...@google.com> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>>> Yoav, your understanding is correct. >>>>>>>>>>> >>>>>>>>>>> I'm still in the process of finalizing the implementation. Once >>>>>>>>>>> that is done, I'll audit some sites that metrics have indicated will >>>>>>>>>>> experience breakage and report back my findings. >>>>>>>>>>> >>>>>>>>>>> On Tue, Mar 19, 2024 at 8:52 AM Mike Taylor < >>>>>>>>>>> miketa...@chromium.org> wrote: >>>>>>>>>>> >>>>>>>>>>>> It would also be helpful to discuss what breakage looks like in >>>>>>>>>>>> this case. Would it be a one-time loss of state (i.e., have to log >>>>>>>>>>>> in >>>>>>>>>>>> again), or something different? >>>>>>>>>>>> On 3/19/24 5:08 AM, Yoav Weiss (@Shopify) wrote: >>>>>>>>>>>> >>>>>>>>>>>> OK, so just to summarize my understanding: >>>>>>>>>>>> >>>>>>>>>>>> - We expect this to have some impact on 0.032% of page views >>>>>>>>>>>> - We have a Finch flag that can be used as a kill switch in >>>>>>>>>>>> case we see lots of breakage in the wild >>>>>>>>>>>> - Developers can get around this deprecation by changing >>>>>>>>>>>> their cookies to be "same-site: none" *and* requesting SAA from >>>>>>>>>>>> users >>>>>>>>>>>> >>>>>>>>>>>> Is the above correct? >>>>>>>>>>>> >>>>>>>>>>>> If so, 0.032% sounds like a lot. Would it be possible for y'all >>>>>>>>>>>> to same pages that trigger that use counter and see how many of >>>>>>>>>>>> them break >>>>>>>>>>>> and what does breakage look like? >>>>>>>>>>>> >>>>>>>>>>>> On Wed, Mar 13, 2024 at 8:23 PM Aaron Selya <se...@google.com> >>>>>>>>>>>> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> The flag is a base::features flag named >>>>>>>>>>>>> kAncestorChainBitEnabledInPartitionedCookies. >>>>>>>>>>>>> >>>>>>>>>>>>> Updated the review gates on chromestatus.com >>>>>>>>>>>>> >>>>>>>>>>>>> On Wed, Mar 13, 2024 at 11:25 AM Yoav Weiss (@Shopify) < >>>>>>>>>>>>> yoavwe...@chromium.org> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> Also, can you flip on the relevant review gates in >>>>>>>>>>>>>> chromestatus.com? >>>>>>>>>>>>>> >>>>>>>>>>>>>> On Wed, Mar 13, 2024 at 11:24 AM Yoav Weiss (@Shopify) < >>>>>>>>>>>>>> yoavwe...@chromium.org> wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> On Tue, Mar 12, 2024 at 4:46 PM 'Aaron Selya' via blink-dev < >>>>>>>>>>>>>>> blink-dev@chromium.org> wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> The first mitigation listed here is to migrate existing >>>>>>>>>>>>>>>>> partitioned cookies to include the new bit, and the second >>>>>>>>>>>>>>>>> mitigation is to >>>>>>>>>>>>>>>>> have a flag that can disable this feature. Would disabling >>>>>>>>>>>>>>>>> the feature also >>>>>>>>>>>>>>>>> include migrating the existing cookies back to exclude the >>>>>>>>>>>>>>>>> new bit? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Disabling the flag would not migrate the existing cookies >>>>>>>>>>>>>>>> back to exclude the new bit. It would make it so that the new >>>>>>>>>>>>>>>> bit value is >>>>>>>>>>>>>>>> not considered when checking equivalence. Not considering the >>>>>>>>>>>>>>>> value of the >>>>>>>>>>>>>>>> bit when is the current behavior so we anticipate no issues >>>>>>>>>>>>>>>> ignoring the >>>>>>>>>>>>>>>> bit if the flag needs to disable the feature. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Can you clarify what kind of flag are we talking about? Is >>>>>>>>>>>>>>> this a Finch flag we expect to turn off if we encounter lots of >>>>>>>>>>>>>>> breakage? >>>>>>>>>>>>>>> An enterprise policy flag? A flag we expect users to use? (I >>>>>>>>>>>>>>> doubt it's the >>>>>>>>>>>>>>> latter, but clarifications would help :D) >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> And somewhat related, but does the format of the cookie >>>>>>>>>>>>>>>>> request developers make have to change too, or is this bit >>>>>>>>>>>>>>>>> determination >>>>>>>>>>>>>>>>> purely done within the browser? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> In almost all cases this is set within the browser. The >>>>>>>>>>>>>>>> only circumstance I've run into where the value could be set >>>>>>>>>>>>>>>> by a developer >>>>>>>>>>>>>>>> is with the chrome.cookies.set api for extensions. This >>>>>>>>>>>>>>>> API allows the developer to set the site associated with the >>>>>>>>>>>>>>>> cookie >>>>>>>>>>>>>>>> partition key and with this change would allow for the bit >>>>>>>>>>>>>>>> value to be set >>>>>>>>>>>>>>>> as well. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On Tue, Mar 12, 2024 at 2:53 PM Vladimir Levin < >>>>>>>>>>>>>>>> vmp...@chromium.org> wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On Mon, Mar 11, 2024 at 1:42 PM Aaron Selya < >>>>>>>>>>>>>>>>> se...@chromium.org> wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Contact emails >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> se...@chromium.org, dylancut...@chromium.org, >>>>>>>>>>>>>>>>>> kaustub...@chromium.org >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Explainer >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Keying of "CHIPS" cookies should align with other state: >>>>>>>>>>>>>>>>>> <https://github.com/privacycg/CHIPS/issues/40#issuecomment-1883726735> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Specification >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Add cross-site ancestor chain bit to spec: >>>>>>>>>>>>>>>>>> https://github.com/explainers-by-googlers/CHIPS-spec/pull/13 >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Summary >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> We are looking to align the partition key >>>>>>>>>>>>>>>>>> <https://developers.google.com/privacy-sandbox/3pcd/chips#:~:text=A%20cookie%27s%20partition%20key%20is%20the%20site%20(scheme%20and%20registrable%20domain)%20of%20the%20top%2Dlevel%20URL%20the%20browser%20was%20visiting%20at%20the%20start%20of%20the%20request%20to%20the%20endpoint%20that%20set%20the%20cookie.> >>>>>>>>>>>>>>>>>> in CHIPS (Cookies Having Independent Partitioned State, aka >>>>>>>>>>>>>>>>>> partitioned >>>>>>>>>>>>>>>>>> cookies) with the existing implementation of StorageKey. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> The only sites that would experience different behavior, >>>>>>>>>>>>>>>>>> would be when a top-level site “A” embeds an iframe to a >>>>>>>>>>>>>>>>>> cross-site >>>>>>>>>>>>>>>>>> document on site “B”, and then the iframe B embeds an iframe >>>>>>>>>>>>>>>>>> that loads a >>>>>>>>>>>>>>>>>> document from site “A” (shorthand: A1->B->A2). Previously, >>>>>>>>>>>>>>>>>> partitioned >>>>>>>>>>>>>>>>>> cookies sent or received in the inner iframe A2 would be the >>>>>>>>>>>>>>>>>> same >>>>>>>>>>>>>>>>>> partitioned cookies sent or received in the outer frame A1. >>>>>>>>>>>>>>>>>> This is no >>>>>>>>>>>>>>>>>> longer true. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> This change is privacy neutral, but will have improved >>>>>>>>>>>>>>>>>> security characteristics, because it prevents cross-site >>>>>>>>>>>>>>>>>> iframes from >>>>>>>>>>>>>>>>>> embedding arbitrary endpoints of the top-level site with >>>>>>>>>>>>>>>>>> credentials, >>>>>>>>>>>>>>>>>> without first being granted permission to do so through the >>>>>>>>>>>>>>>>>> Storage Access >>>>>>>>>>>>>>>>>> API (SAA) or Cross-Origin Resource Sharing (CORS). >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> The impact of this change is expected to be small as our >>>>>>>>>>>>>>>>>> metrics indicate that only 0.2% of CHIPS (partitioned >>>>>>>>>>>>>>>>>> cookies) set by the >>>>>>>>>>>>>>>>>> first party are currently being used in A1->B->A2 contexts. >>>>>>>>>>>>>>>>>> This >>>>>>>>>>>>>>>>>> constitutes 0.032% of all page loads (calculated using the >>>>>>>>>>>>>>>>>> usage of >>>>>>>>>>>>>>>>>> PartitionedCookie >>>>>>>>>>>>>>>>>> <https://chromestatus.com/metrics/feature/timeline/popularity/4177>). >>>>>>>>>>>>>>>>>> For websites that do need access to the same cookies across >>>>>>>>>>>>>>>>>> A1 and A2 (in >>>>>>>>>>>>>>>>>> the A1->B->A2 configuration), we recommend using >>>>>>>>>>>>>>>>>> SameSite=None cookies >>>>>>>>>>>>>>>>>> *without* the Partitioned attribute, and invoking the >>>>>>>>>>>>>>>>>> Storage Access API >>>>>>>>>>>>>>>>>> (SAA) or using the Cross-Origin Resource Sharing (CORS). >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Blink component >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Internals>Network>Cookies>PartitionedCookies >>>>>>>>>>>>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Internals%3ENetwork%3ECookies%3EPartitionedCookies%22> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> TAG review >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Not requested, as this does not differ in any significant >>>>>>>>>>>>>>>>>> way from the original CHIPS design that was already reviewed >>>>>>>>>>>>>>>>>> by TAG >>>>>>>>>>>>>>>>>> <https://github.com/w3ctag/design-reviews/issues/779>. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> TAG review status >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> N/A >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Risks >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> The inclusion of a new element in the partition key will >>>>>>>>>>>>>>>>>> mean that partitioned cookies (CHIPS) created after the >>>>>>>>>>>>>>>>>> launch of this >>>>>>>>>>>>>>>>>> change will not be compatible with the partitioned cookies >>>>>>>>>>>>>>>>>> that already >>>>>>>>>>>>>>>>>> exist in users cookie jars. To address this, existing >>>>>>>>>>>>>>>>>> partitioned cookies >>>>>>>>>>>>>>>>>> will be migrated (without any need for developer action) to >>>>>>>>>>>>>>>>>> include the new >>>>>>>>>>>>>>>>>> cross-site ancestor chain bit value, which will be set with >>>>>>>>>>>>>>>>>> a value of true >>>>>>>>>>>>>>>>>> if the existing partition key does not match the host key >>>>>>>>>>>>>>>>>> (indicating a >>>>>>>>>>>>>>>>>> cross site ancestor is present) and false if the partition >>>>>>>>>>>>>>>>>> key does match >>>>>>>>>>>>>>>>>> the host key. This will ensure that most existing CHIPS have >>>>>>>>>>>>>>>>>> the same scope >>>>>>>>>>>>>>>>>> as they did prior to the change. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Only 0.2% of partitioned cookies are utilized from within >>>>>>>>>>>>>>>>>> A1->B->A2 scenarios, but developers who need to be able to >>>>>>>>>>>>>>>>>> access cookies >>>>>>>>>>>>>>>>>> in A1->B->A2 scenarios will be able to use SAA, and CORS to >>>>>>>>>>>>>>>>>> gain access to >>>>>>>>>>>>>>>>>> those cookies, after transitioning to SameSite=None cookies >>>>>>>>>>>>>>>>>> without the >>>>>>>>>>>>>>>>>> Partitioned attribute. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> To limit the impact of any significant breakages that may >>>>>>>>>>>>>>>>>> occur when this is deployed, the new feature will be gated >>>>>>>>>>>>>>>>>> by a flag >>>>>>>>>>>>>>>>>> allowing for it to be turned off easily. Additionally >>>>>>>>>>>>>>>>>> metrics are being >>>>>>>>>>>>>>>>>> gathered to proactively identify the sites that are going to >>>>>>>>>>>>>>>>>> be impacted by >>>>>>>>>>>>>>>>>> this change, so that we can do outreach to potentially >>>>>>>>>>>>>>>>>> impacted sites. As >>>>>>>>>>>>>>>>>> this feature gets deployed, we will monitor the bug and >>>>>>>>>>>>>>>>>> breakage reports to >>>>>>>>>>>>>>>>>> help identify issues and assist developers in transitioning >>>>>>>>>>>>>>>>>> to one of the >>>>>>>>>>>>>>>>>> other mechanisms that will allow their sites to work in an >>>>>>>>>>>>>>>>>> A1->B->A2 >>>>>>>>>>>>>>>>>> context. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> The first mitigation listed here is to migrate existing >>>>>>>>>>>>>>>>> partitioned cookies to include the new bit, and the second >>>>>>>>>>>>>>>>> mitigation is to >>>>>>>>>>>>>>>>> have a flag that can disable this feature. Would disabling >>>>>>>>>>>>>>>>> the feature also >>>>>>>>>>>>>>>>> include migrating the existing cookies back to exclude the >>>>>>>>>>>>>>>>> new bit? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> And somewhat related, but does the format of the cookie >>>>>>>>>>>>>>>>> request developers make have to change too, or is this bit >>>>>>>>>>>>>>>>> determination >>>>>>>>>>>>>>>>> purely done within the browser? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> As this does not differ in any significant way from the >>>>>>>>>>>>>>>>>> original partitioned cookies design that has been >>>>>>>>>>>>>>>>>> reviewed in the past, we are not seeking the various >>>>>>>>>>>>>>>>>> browsers to take >>>>>>>>>>>>>>>>>> official positions in their standards position repos. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> There is support for the adoption of CHIPS >>>>>>>>>>>>>>>>>> <https://github.com/mozilla/standards-positions/issues/678#issuecomment-1241916316> >>>>>>>>>>>>>>>>>> from Firefox as well as support from them for adding the >>>>>>>>>>>>>>>>>> cross-site >>>>>>>>>>>>>>>>>> ancestor chain bit >>>>>>>>>>>>>>>>>> <https://github.com/privacycg/meetings/blob/main/2023/telcons/10-12-minutes.md#keying-of-chips-cookies-should-align-with-other-state> >>>>>>>>>>>>>>>>>> . >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Webkit is still considering adopting CHIPS >>>>>>>>>>>>>>>>>> <https://github.com/WebKit/standards-positions/issues/50#issuecomment-1768040057> >>>>>>>>>>>>>>>>>> as we work through their concerns >>>>>>>>>>>>>>>>>> <https://github.com/privacycg/CHIPS/issues/74> regarding >>>>>>>>>>>>>>>>>> partition size limitations. This will not be impacted by the >>>>>>>>>>>>>>>>>> addition of a >>>>>>>>>>>>>>>>>> cross-site ancestor chain bit. We updated the WebKit >>>>>>>>>>>>>>>>>> standards positions >>>>>>>>>>>>>>>>>> issue with a note regarding this change to the proposal. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Debuggability >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> DevTools will need to be updated >>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/detail?id=1516984> >>>>>>>>>>>>>>>>>> to show the cross-site ancestor chain bit but otherwise it >>>>>>>>>>>>>>>>>> should be able >>>>>>>>>>>>>>>>>> to be debugged like other API calls. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Will this feature be supported on all six Blink platforms >>>>>>>>>>>>>>>>>> (Windows, Mac, Linux, Chrome OS, Android, and Android >>>>>>>>>>>>>>>>>> WebView)? >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> All platforms listed. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>>>>>>>>>>>> ? >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> We plan to land web-platform-tests shortly >>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/detail?id=1521791> >>>>>>>>>>>>>>>>>> . >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Flag name on chrome://flags >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> CookiePartitionKeyIncludesCrossSiteAncestorChainBit >>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/detail?id=1521841> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Finch feature name >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> None >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Could you please clarify if the flag you mentioned is a >>>>>>>>>>>>>>>>> Finch flag or something else? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Requires code in //chrome? >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> False >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Estimated milestones >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Targeted shipping on desktop and Android in M125. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Anticipated spec changes >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> None >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> https://chromestatus.com/feature/5144832583663616 >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>> You received this message because you are subscribed to >>>>>>>>>>>>>>>>>> the Google Groups "blink-dev" group. >>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails >>>>>>>>>>>>>>>>>> from it, send an email to >>>>>>>>>>>>>>>>>> blink-dev+unsubscr...@chromium.org. >>>>>>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPSgjYROtVMp%3DmfBLFdW5KiRYkcFx0NG3U%3DT_vtbm2b7UEzm0w%40mail.gmail.com >>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPSgjYROtVMp%3DmfBLFdW5KiRYkcFx0NG3U%3DT_vtbm2b7UEzm0w%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>>>>>> . >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails >>>>>>>>>>>>>>>> from it, send an email to >>>>>>>>>>>>>>>> blink-dev+unsubscr...@chromium.org. >>>>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU7so-698-KYua_iQ6PPyHQ_NnBcnJr-XetP%2BDCG_gQeWA%40mail.gmail.com >>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU7so-698-KYua_iQ6PPyHQ_NnBcnJr-XetP%2BDCG_gQeWA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>>>> . >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> -- >>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>> it, send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohSL78hpV-iy6Ce%3Dn4a-aU21-2vj%2Bce4D9rLE_R0oUWKpqQ%40mail.gmail.com >>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohSL78hpV-iy6Ce%3Dn4a-aU21-2vj%2Bce4D9rLE_R0oUWKpqQ%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>> . >>>>>>>>>>>> >>>>>>>>>>>> -- >>>>>> You received this message because you are subscribed to the Google >>>>>> Groups "blink-dev" group. >>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>> To view this discussion on the web visit >>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU4S-uqANu6JeJUxBy2vNecqfmnoqkQXQyeprdc_Qjo3BA%40mail.gmail.com >>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU4S-uqANu6JeJUxBy2vNecqfmnoqkQXQyeprdc_Qjo3BA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>> . >>>>>> >>>>> -- >> You received this message because you are subscribed to the Google Groups >> "blink-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to blink-dev+unsubscr...@chromium.org. >> To view this discussion on the web visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU6hhVnSwx%2BwKL1haCmtAq7Cx5qZ6ghmMOsMEoHkAd%3DA6A%40mail.gmail.com >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU6hhVnSwx%2BwKL1haCmtAq7Cx5qZ6ghmMOsMEoHkAd%3DA6A%40mail.gmail.com?utm_medium=email&utm_source=footer> >> . >> >> -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion on the web visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU4MeFwdTqpMM5CDHvz0xL51PsbsuA3w5wLhR6-EEZp6Qw%40mail.gmail.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALXbKU4MeFwdTqpMM5CDHvz0xL51PsbsuA3w5wLhR6-EEZp6Qw%40mail.gmail.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw92FRf_uz%3D8NTAP92sH%3DEjLOeXOBWjqUB4WbFqBx6oKWQ%40mail.gmail.com.