Thanks for all of this. Any reason not to pivot this intent to a gapless I2S?
On Tuesday, July 15, 2025 at 11:02:05 AM UTC-7 Jeffrey Yasskin wrote: > On Tue, Jul 15, 2025 at 10:44 AM Chromestatus < > ad...@cr-status.appspotmail.com> wrote: > >> Contact emails rby...@chromium.org, g...@chromium.org, ma...@chromium.org, >> ashimaar...@google.com >> >> Explainer >> https://github.com/w3c-fedid/digital-credentials/blob/main/explainer.md >> >> Specification https://w3c-fedid.github.io/digital-credentials >> >> Summary >> >> Websites can and do get credentials from mobile wallet apps through a >> variety of mechanisms today (custom URL handlers, QR code scanning, etc.). >> This Web Platform feature would allow sites to request identity information >> from wallets via Android's IdentityCredential CredMan system. It is >> extensible to support multiple credential formats (eg. ISO mDoc and W3C >> verifiable credential) and allows multiple wallet apps to be used. >> Mechanisms are being added to help reduce the risk of ecosystem-scale abuse >> of real-world identity (see >> https://docs.google.com/document/u/1/d/1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit). >> >> >> >> >> Blink component Blink>Identity>DigitalCredentials >> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EDigitalCredentials%22> >> >> >> TAG review Mozilla feedback from Martin (also on the TAG) suggests we >> need to invest more in the threat model for the larger space and clarify >> specific privacy mitigations before shipping or requesting TAG review. > > > FWIW, Wendy Seltzer did send a TAG review for this, at > https://github.com/w3ctag/design-reviews/issues/1119. > > TAG review status Pending >> >> Origin Trial Name Digital Credentials API >> >> Chromium Trial Name WebIdentityDigitalCredentials >> >> Origin Trial documentation link >> https://wicg.github.io/digital-credentials >> >> WebFeature UseCounter name kIdentityDigitalCredentials >> >> Risks >> >> >> Interoperability and Compatibility >> >> There are multiple standards efforts involved here. We have been working >> with WebKit and Mozilla in the WICG on defining this specific API. But the >> greater interoperability risk will come from the data that is sent and >> returned via this API. Details of that are still in discussions but mostly >> driven outside the web browser community in the OpenID Foundation (eg. >> OpenID4VP: >> https://openid.net/specs/openid-4-verifiable-presentations-1_0.html) and >> ISO (18013-7 "mdoc": https://www.iso.org/standard/82772.html) >> >> >> *Gecko*: Negative ( >> https://github.com/mozilla/standards-positions/issues/1003) We share >> most of Mozilla's concerns and continue to work with them (and the broader >> community) on mitigations. I believe we feel greater risk for the >> established practice of custom schemes becoming prevalent than Mozilla does >> (eg. due to Google being mandated by eIDAS regulation to accept EUDI >> credentials). >> >> *WebKit*: In development ( >> https://github.com/WebKit/standards-positions/issues/332) WebKit >> implementation progress: https://bugs.webkit.org/show_bug.cgi?id=268516 >> >> *Web developers*: No signals >> >> *Other signals*: This work in the W3C PING is relevant: >> https://github.com/w3cping/credential-considerations/ >> >> Ergonomics >> >> There's a possibility that these credentials will be used alongside other >> types of credentials in the future - such as optionally minting a passkey >> when a digital credential is used to sign up for a site, or by allowing >> sign-up with either a digital credential or a federated credential via >> FedCM. As such we argued it was best to put this work in the context of the >> Credential Management API, and hence the support is added in >> 'navigator.identity.get() API . >> >> >> Activation >> >> The primary activation concern is enabling existing deployments using >> technology like OpenID4VP to be able to also support this API. As such we >> have left the request protocol unspecified at this layer, to be specified >> along with existing request protocols to maximize activation opportunity. >> >> >> Security >> >> See >> https://github.com/WICG/digital-credentials/blob/main/horizontal-reviews/security-privacy.md >> >> and https://github.com/w3c-fedid/digital-credentials/issues/115 >> >> >> WebView application risks >> >> Does this intent deprecate or change behavior of existing APIs, such that >> it has potentially high risk for Android WebView-based applications? >> >> >> >> Goals for experimentation >> >> >> >> Reason this experiment is being extended >> >> We have made significant progress on the spec (specifically the privacy >> and security sections), and the First Public Working Draft has been >> published on the 1st of July 2025. We are currently waiting for the TAG >> review and hence would like to extend this OT for one more milestone. We >> are optimistic that by the end of this time we will have received a >> positive TAG review, which will unblock shipping the API. >> >> >> Reason this experiment is being extended >> >> - W3C team report on Digital Credentials formal objection is now >> published with, as expected, a recommendation to overrule the objection: >> https://www.w3.org/2024/10/team-report-fedid-wg-fo.html - We have made >> progress with updating the spec and updated the implementation to match the >> latest spec (changing the request and response format, and support multiple >> requests) and we would like to test such implementation. - Google Birthday >> Correct Flow implementation is also being updated to support both legacy >> and modern format. - We have delayed announcing the cross-device OT because >> of issue with 3rd party camera apps, we have reached out to other OEMs to >> fix it. >> >> >> Reason this experiment is being extended >> >> I'd like to request permission to extend an OT for this API. The >> experiment has been running for Android only so far, but in the meanwhile: >> 1- There has been progress on the spec >> https://wicg.github.io/digital-credentials/ and it is expected to >> graduate to the FedID WG soon. 2- We have added Desktop cross-device >> support. Therefore, we are requesting the extension. >> >> >> Ongoing technical constraints >> >> None >> >> >> Debuggability >> >> None necessary - just new JS API. For testing we may want to add a >> developer option to provide a fake wallet (as for the devtools fake >> authenticator for WebAuthn), but this is not urgent. >> >> >> Will this feature be supported on all six Blink platforms (Windows, Mac, >> Linux, ChromeOS, Android, and Android WebView)? No >> >> Android and Desktop Only >> >> >> Is this feature fully tested by web-platform-tests >> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >> ? Yes >> >> >> https://wpt.fyi/results/digital-credentials?label=master&label=experimental&aligned >> >> >> DevTrial instructions https://digitalcredentials.dev/docs/requirements >> >> Flag name on about://flags web-identity-digital-credentials >> >> Finch feature name WebIdentityDigitalCredentials >> >> Requires code in //chrome? True >> >> Tracking bug https://issues.chromium.org/issues/40257092 >> >> Launch bug https://launch.corp.google.com/launch/4268575 >> >> Estimated milestones >> Shipping on desktop 141 >> Origin trial desktop first 134 >> Origin trial desktop last 136 >> Origin trial extension 1 end milestone 140 >> Origin trial extension 2 end milestone 139 >> Origin trial extension 3 end milestone 136 >> DevTrial on desktop 133 >> Shipping on Android 141 >> Origin trial Android first 128 >> Origin trial Android last 133 >> DevTrial on Android 119 >> >> Link to entry on the Chrome Platform Status >> https://chromestatus.com/feature/5166035265650688?gate=5169620323139584 >> >> Links to previous Intent discussions Intent to Prototype: >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL9PXLx3sHWmdE-ikAEDay_S3ijf0%2BfxB_LbsuOx8YJx%2BZA7%2Bg%40mail.gmail.com >> >> Intent to Experiment: >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-421uDmu2WNDBG5bYRSWAhfmahsHPVjDwN5NLkUdCkvw%40mail.gmail.com >> >> Intent to Extend Experiment 2: >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/67f3fe84.170a0220.25676e.143e.GAE%40google.com >> >> Intent to Extend Experiment 3: >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com >> >> >> >> This intent message was generated by Chrome Platform Status >> <https://chromestatus.com>. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "blink-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to blink-dev+unsubscr...@chromium.org. >> To view this discussion visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.0109.GAE%40google.com >> >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.0109.GAE%40google.com?utm_medium=email&utm_source=footer> >> . >> > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/7373f761-f905-41aa-b153-a2aaaffc88d2n%40chromium.org.