Thanks Alex! Could you please clarify what you mean with "pivot this intent to a gapless I2S"? (sorry but I am a bit confused) I am requesting the extension to cover up to and including Chrome 140, and we are optimistic that we will be able to send the I2S for 141.
Doesn't this qualify as a gapless I2S? On Wed, Jul 16, 2025 at 5:26 PM Alex Russell <slightly...@chromium.org> wrote: > Thanks for all of this. Any reason not to pivot this intent to a gapless > I2S? > > On Tuesday, July 15, 2025 at 11:02:05 AM UTC-7 Jeffrey Yasskin wrote: > >> On Tue, Jul 15, 2025 at 10:44 AM Chromestatus < >> ad...@cr-status.appspotmail.com> wrote: >> >>> Contact emails rby...@chromium.org, g...@chromium.org, >>> ma...@chromium.org, ashimaar...@google.com >>> >>> Explainer >>> https://github.com/w3c-fedid/digital-credentials/blob/main/explainer.md >>> >>> Specification https://w3c-fedid.github.io/digital-credentials >>> >>> Summary >>> >>> Websites can and do get credentials from mobile wallet apps through a >>> variety of mechanisms today (custom URL handlers, QR code scanning, etc.). >>> This Web Platform feature would allow sites to request identity information >>> from wallets via Android's IdentityCredential CredMan system. It is >>> extensible to support multiple credential formats (eg. ISO mDoc and W3C >>> verifiable credential) and allows multiple wallet apps to be used. >>> Mechanisms are being added to help reduce the risk of ecosystem-scale abuse >>> of real-world identity (see >>> https://docs.google.com/document/u/1/d/1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit). >>> >>> >>> >>> Blink component Blink>Identity>DigitalCredentials >>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EDigitalCredentials%22> >>> >>> TAG review Mozilla feedback from Martin (also on the TAG) suggests we >>> need to invest more in the threat model for the larger space and clarify >>> specific privacy mitigations before shipping or requesting TAG review. >> >> >> FWIW, Wendy Seltzer did send a TAG review for this, at >> https://github.com/w3ctag/design-reviews/issues/1119. >> >> TAG review status Pending >>> >>> Origin Trial Name Digital Credentials API >>> >>> Chromium Trial Name WebIdentityDigitalCredentials >>> >>> Origin Trial documentation link >>> https://wicg.github.io/digital-credentials >>> >>> WebFeature UseCounter name kIdentityDigitalCredentials >>> >>> Risks >>> >>> >>> Interoperability and Compatibility >>> >>> There are multiple standards efforts involved here. We have been working >>> with WebKit and Mozilla in the WICG on defining this specific API. But the >>> greater interoperability risk will come from the data that is sent and >>> returned via this API. Details of that are still in discussions but mostly >>> driven outside the web browser community in the OpenID Foundation (eg. >>> OpenID4VP: >>> https://openid.net/specs/openid-4-verifiable-presentations-1_0.html) >>> and ISO (18013-7 "mdoc": https://www.iso.org/standard/82772.html) >>> >>> >>> *Gecko*: Negative ( >>> https://github.com/mozilla/standards-positions/issues/1003) We share >>> most of Mozilla's concerns and continue to work with them (and the broader >>> community) on mitigations. I believe we feel greater risk for the >>> established practice of custom schemes becoming prevalent than Mozilla does >>> (eg. due to Google being mandated by eIDAS regulation to accept EUDI >>> credentials). >>> >>> *WebKit*: In development ( >>> https://github.com/WebKit/standards-positions/issues/332) WebKit >>> implementation progress: https://bugs.webkit.org/show_bug.cgi?id=268516 >>> >>> *Web developers*: No signals >>> >>> *Other signals*: This work in the W3C PING is relevant: >>> https://github.com/w3cping/credential-considerations/ >>> >>> Ergonomics >>> >>> There's a possibility that these credentials will be used alongside >>> other types of credentials in the future - such as optionally minting a >>> passkey when a digital credential is used to sign up for a site, or by >>> allowing sign-up with either a digital credential or a federated credential >>> via FedCM. As such we argued it was best to put this work in the context of >>> the Credential Management API, and hence the support is added in >>> 'navigator.identity.get() API . >>> >>> >>> Activation >>> >>> The primary activation concern is enabling existing deployments using >>> technology like OpenID4VP to be able to also support this API. As such we >>> have left the request protocol unspecified at this layer, to be specified >>> along with existing request protocols to maximize activation opportunity. >>> >>> >>> Security >>> >>> See >>> https://github.com/WICG/digital-credentials/blob/main/horizontal-reviews/security-privacy.md >>> and https://github.com/w3c-fedid/digital-credentials/issues/115 >>> >>> >>> WebView application risks >>> >>> Does this intent deprecate or change behavior of existing APIs, such >>> that it has potentially high risk for Android WebView-based applications? >>> >>> >>> >>> Goals for experimentation >>> >>> >>> >>> Reason this experiment is being extended >>> >>> We have made significant progress on the spec (specifically the privacy >>> and security sections), and the First Public Working Draft has been >>> published on the 1st of July 2025. We are currently waiting for the TAG >>> review and hence would like to extend this OT for one more milestone. We >>> are optimistic that by the end of this time we will have received a >>> positive TAG review, which will unblock shipping the API. >>> >>> >>> Reason this experiment is being extended >>> >>> - W3C team report on Digital Credentials formal objection is now >>> published with, as expected, a recommendation to overrule the objection: >>> https://www.w3.org/2024/10/team-report-fedid-wg-fo.html - We have made >>> progress with updating the spec and updated the implementation to match the >>> latest spec (changing the request and response format, and support multiple >>> requests) and we would like to test such implementation. - Google Birthday >>> Correct Flow implementation is also being updated to support both legacy >>> and modern format. - We have delayed announcing the cross-device OT because >>> of issue with 3rd party camera apps, we have reached out to other OEMs to >>> fix it. >>> >>> >>> Reason this experiment is being extended >>> >>> I'd like to request permission to extend an OT for this API. The >>> experiment has been running for Android only so far, but in the meanwhile: >>> 1- There has been progress on the spec >>> https://wicg.github.io/digital-credentials/ and it is expected to >>> graduate to the FedID WG soon. 2- We have added Desktop cross-device >>> support. Therefore, we are requesting the extension. >>> >>> >>> Ongoing technical constraints >>> >>> None >>> >>> >>> Debuggability >>> >>> None necessary - just new JS API. For testing we may want to add a >>> developer option to provide a fake wallet (as for the devtools fake >>> authenticator for WebAuthn), but this is not urgent. >>> >>> >>> Will this feature be supported on all six Blink platforms (Windows, Mac, >>> Linux, ChromeOS, Android, and Android WebView)? No >>> >>> Android and Desktop Only >>> >>> >>> Is this feature fully tested by web-platform-tests >>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>> ? Yes >>> >>> >>> https://wpt.fyi/results/digital-credentials?label=master&label=experimental&aligned >>> >>> >>> DevTrial instructions https://digitalcredentials.dev/docs/requirements >>> >>> Flag name on about://flags web-identity-digital-credentials >>> >>> Finch feature name WebIdentityDigitalCredentials >>> >>> Requires code in //chrome? True >>> >>> Tracking bug https://issues.chromium.org/issues/40257092 >>> >>> Launch bug https://launch.corp.google.com/launch/4268575 >>> >>> Estimated milestones >>> Shipping on desktop 141 >>> Origin trial desktop first 134 >>> Origin trial desktop last 136 >>> Origin trial extension 1 end milestone 140 >>> Origin trial extension 2 end milestone 139 >>> Origin trial extension 3 end milestone 136 >>> DevTrial on desktop 133 >>> Shipping on Android 141 >>> Origin trial Android first 128 >>> Origin trial Android last 133 >>> DevTrial on Android 119 >>> >>> Link to entry on the Chrome Platform Status >>> https://chromestatus.com/feature/5166035265650688?gate=5169620323139584 >>> >>> Links to previous Intent discussions Intent to Prototype: >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL9PXLx3sHWmdE-ikAEDay_S3ijf0%2BfxB_LbsuOx8YJx%2BZA7%2Bg%40mail.gmail.com >>> Intent to Experiment: >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-421uDmu2WNDBG5bYRSWAhfmahsHPVjDwN5NLkUdCkvw%40mail.gmail.com >>> Intent to Extend Experiment 2: >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/67f3fe84.170a0220.25676e.143e.GAE%40google.com >>> Intent to Extend Experiment 3: >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com >>> >>> >>> This intent message was generated by Chrome Platform Status >>> <https://chromestatus.com>. >>> >>> -- >>> You received this message because you are subscribed to the Google >>> Groups "blink-dev" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to blink-dev+unsubscr...@chromium.org. >>> To view this discussion visit >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.0109.GAE%40google.com >>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.0109.GAE%40google.com?utm_medium=email&utm_source=footer> >>> . >>> >> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOZU3iGzJ9yn7WmV6j3JkARgqyvm3Q4ePYevY5S4m-dcKFEOrw%40mail.gmail.com.