Ok, it sounds like you're asking for something conceptually similar to https://learn.microsoft.com/en-us/microsoft-edge/web-platform/tracking-prevention? I think we can pull that together.
Thanks for the suggestion! -mike On Tue, Jul 22, 2025 at 4:00 PM Alex Russell <slightly...@chromium.org> wrote: > Nothing first that I'm not asking from an Edge perspective (we have the > resources to follow along with most things y'all do), a sketch for how a > small browser might implement bloxking using the same list y'all do would > be enough for me. > > Thanks! > > On Tue, Jul 22, 2025, 11:47 AM Mike West <mk...@google.com> wrote: > >> Hey Alex! Thanks for your feedback (and LGTM :) )! >> >> On documentation: we have a PR up against Fetch at >> https://github.com/whatwg/fetch/pull/1840 which aims to clarify the >> timing and web-facing impact of a blocking decision, and the list of >> affected domains is up at >> https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md. >> What additional documentation would you like to see that would improve >> consistency across vendors? >> >> That said, I think we have to broadly accept that different vendors are >> going to make different decisions about which resources they allow to load >> in a given context. This is already the case from a security perspective >> with choices between Safe Browsing and SmartScreen, and is already the case >> from a privacy perspective with decisions around subsetting blocklist >> vendors' lists which vary given each user agent's priorities and risk >> tolerance. I don't think it's likely that there's going to be alignment on >> a single list in the near-term. That doesn't seem fatal to me, as long as >> we agree on the web-facing impact. Does that more or less align with your >> view, or should we be aiming for a different compatibility bar in the long >> run? >> >> -mike >> >> >> On Tue, Jul 22, 2025 at 12:07 PM Alex Russell <slightly...@chromium.org> >> wrote: >> >>> I remain concerned that this behaviour isn't going to be shared by other >>> Chromium-based browsers. Web Platform behaviour differences between our >>> implementations opens up risks of ongoing divergence, and so I'm going to >>> LGTM3 on the condition that documentation is produced for other embedders >>> that wish to adopt the same behaviour in a straightforward way. >>> >>> Best, >>> >>> Alex >>> >>> On Wednesday, July 16, 2025 at 6:39:57 PM UTC+1 Philip Jägenstedt wrote: >>> >>>> LGTM2 >>>> >>>> On Wed, Jul 16, 2025 at 5:55 PM Chris Harrelson <chris...@chromium.org> >>>> wrote: >>>> >>>>> Ok, thanks for clarifying. >>>>> >>>>> LGTM1 >>>>> >>>>> On Wed, Jul 16, 2025 at 8:51 AM 'Zainab Rizvi' via blink-dev < >>>>> blink-dev@chromium.org> wrote: >>>>> >>>>>> Hi Chris! We will have a few UI indicators when a resource is blocked: >>>>>> >>>>>> 1. The "eye" icon will show up in the Omnibox that will allow users >>>>>> to disable the feature on a particular top-level site. >>>>>> 2. There is a toggle in settings for users to disable the feature >>>>>> entirely. >>>>>> 3. For developers, a dedicated issue will pop up in the "Issues" tab. >>>>>> 4. For developers, there is a dedicated network error >>>>>> <https://source.chromium.org/chromium/chromium/src/+/main:net/base/net_error_list.h;l=136?q=BLOCKED_BY_FINGER&sq=&ss=chromium> >>>>>> in >>>>>> the "Network" tab. >>>>>> >>>>>> On Wed, Jul 16, 2025 at 11:32 AM Chris Harrelson < >>>>>> chris...@chromium.org> wrote: >>>>>> >>>>>>> In case of something breaking: When a script is blocked, is the user >>>>>>> able to find that out in a site settings dialog? >>>>>>> >>>>>>> On Tue, Jul 15, 2025 at 7:59 AM 'Zainab Rizvi' via blink-dev < >>>>>>> blink-dev@chromium.org> wrote: >>>>>>> >>>>>>>> Yes, though Script Blocking in Incognito would have the same >>>>>>>> observable effect as extensions that block resources, such as ad >>>>>>>> blockers. >>>>>>>> The team is also adding monitoring to see if incognito detectability >>>>>>>> is on >>>>>>>> the rise due to these features. >>>>>>>> >>>>>>>> On Mon, Jul 14, 2025 at 7:23 PM Gregg Tavares <g...@chromium.org> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Does this enable more detection of incognito mode by sites? >>>>>>>>> >>>>>>>>> On Mon, Jul 14, 2025 at 1:08 PM 'Zainab Rizvi' via blink-dev < >>>>>>>>> blink-dev@chromium.org> wrote: >>>>>>>>> >>>>>>>>>> Hi, Alex! This will only be enabled for Chrome's Incognito mode. >>>>>>>>>> >>>>>>>>>> On Mon, Jul 14, 2025 at 2:19 PM Alex Russell < >>>>>>>>>> slightly...@chromium.org> wrote: >>>>>>>>>> >>>>>>>>>>> Will this be enabled for all Chromium browsers by default? >>>>>>>>>>> >>>>>>>>>>> On Monday, July 14, 2025 at 8:54:57 AM UTC-7 riz...@google.com >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>>> Contact emails >>>>>>>>>>>> >>>>>>>>>>>> riz...@google.com, mk...@chromium.org >>>>>>>>>>>> >>>>>>>>>>>> Explainer >>>>>>>>>>>> >>>>>>>>>>>> https://github.com/explainers-by-googlers/script-blocking >>>>>>>>>>>> >>>>>>>>>>>> Specification >>>>>>>>>>>> >>>>>>>>>>>> https://github.com/whatwg/fetch/pull/1840 >>>>>>>>>>>> >>>>>>>>>>>> Summary >>>>>>>>>>>> >>>>>>>>>>>> Mitigating API Misuse for Browser Re-Identification, otherwise >>>>>>>>>>>> known as Script Blocking, is a feature that will block scripts >>>>>>>>>>>> engaging in >>>>>>>>>>>> known, prevalent techniques for browser re-identification in >>>>>>>>>>>> third-party >>>>>>>>>>>> contexts. These techniques typically involve the misuse of >>>>>>>>>>>> existing browser >>>>>>>>>>>> APIs to extract additional information about the user's browser or >>>>>>>>>>>> device >>>>>>>>>>>> characteristics. >>>>>>>>>>>> >>>>>>>>>>>> To strike this balance between protection and usability, this >>>>>>>>>>>> proposal focuses on blocking scripts in a third-party context in >>>>>>>>>>>> Incognito >>>>>>>>>>>> mode, enhancing Incognito's protections against cross-site >>>>>>>>>>>> tracking when >>>>>>>>>>>> users choose to browse in this mode. >>>>>>>>>>>> >>>>>>>>>>>> This proposal uses a list-based approach, where only domains >>>>>>>>>>>> marked as “Impacted by Script Blocking” on the Masked Domain >>>>>>>>>>>> List >>>>>>>>>>>> <https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md> >>>>>>>>>>>> (MDL) in a third-party context will be impacted. >>>>>>>>>>>> >>>>>>>>>>>> When the feature is enabled, Chrome will check network requests >>>>>>>>>>>> against the blocklist. This feature will reuse Chromium's >>>>>>>>>>>> subresource_filter component, which is responsible for tagging and >>>>>>>>>>>> filtering subresource requests based on page-level activation >>>>>>>>>>>> signals and a >>>>>>>>>>>> ruleset used to match URLs for filtering. >>>>>>>>>>>> >>>>>>>>>>>> 1% Experiment Summary >>>>>>>>>>>> >>>>>>>>>>>> Our 1% stable Incognito experiment did not show any >>>>>>>>>>>> statistically significant movement for Incognito-specific Core Web >>>>>>>>>>>> Vitals. >>>>>>>>>>>> Furthermore, we did not receive any breakage reports pertaining to >>>>>>>>>>>> this >>>>>>>>>>>> experiment. >>>>>>>>>>>> >>>>>>>>>>>> As the feature is only enabled for third party resources in >>>>>>>>>>>> Incognito sessions, the sample size is smaller than we typically >>>>>>>>>>>> observe in >>>>>>>>>>>> a 1% experiment. We plan to carefully ramp the experiment to >>>>>>>>>>>> evaluate >>>>>>>>>>>> performance and stability impact before launching to Incognito >>>>>>>>>>>> 100%. >>>>>>>>>>>> >>>>>>>>>>>> Blink component >>>>>>>>>>>> >>>>>>>>>>>> Blink>Network>FetchAPI >>>>>>>>>>>> >>>>>>>>>>>> TAG review >>>>>>>>>>>> >>>>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/1114 >>>>>>>>>>>> >>>>>>>>>>>> TAG review status >>>>>>>>>>>> >>>>>>>>>>>> Closed (resolution: decline) >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Risks >>>>>>>>>>>> >>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>> >>>>>>>>>>>> There shouldn’t be any interop concerns. >>>>>>>>>>>> >>>>>>>>>>>> In terms of compatibility, this feature is anticipated to have >>>>>>>>>>>> an impact on websites that rely on scripts from domains identified >>>>>>>>>>>> as >>>>>>>>>>>> serving fingerprinting techniques. Sites that integrate >>>>>>>>>>>> third-party scripts >>>>>>>>>>>> from identified domains may experience functional breakage or >>>>>>>>>>>> render >>>>>>>>>>>> incorrectly when accessed in Incognito mode. We are attempting to >>>>>>>>>>>> mitigate >>>>>>>>>>>> this risk by applying temporary exceptions if we determine that the >>>>>>>>>>>> intervention on a particular domain may cause significant user >>>>>>>>>>>> experience >>>>>>>>>>>> impact. >>>>>>>>>>>> >>>>>>>>>>>> Gecko: No signal >>>>>>>>>>>> >>>>>>>>>>>> WebKit: Shipped/Shipping Safari has a similar feature as part >>>>>>>>>>>> of "Intelligent Tracking Prevention" (ITP) >>>>>>>>>>>> >>>>>>>>>>>> Firefox: Shipped/Shipping Firefox has a similar feature as part >>>>>>>>>>>> of "Enhanced Tracking Protection" >>>>>>>>>>>> >>>>>>>>>>>> Web developers: <will fill out after explainer publication> >>>>>>>>>>>> >>>>>>>>>>>> WebView application risks >>>>>>>>>>>> >>>>>>>>>>>> Does this intent deprecate or change behavior of existing APIs, >>>>>>>>>>>> such that it has potentially high risk for Android WebView-based >>>>>>>>>>>> applications? >>>>>>>>>>>> >>>>>>>>>>>> No, we are not proposing to ship this on WebView. >>>>>>>>>>>> >>>>>>>>>>>> Debuggability >>>>>>>>>>>> >>>>>>>>>>>> We have added support in DevTools Issues to indicate which >>>>>>>>>>>> requests are being blocked by this feature. >>>>>>>>>>>> >>>>>>>>>>>> We also have >>>>>>>>>>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito >>>>>>>>>>>> which >>>>>>>>>>>> developers and users can use for testing suspected breakage even >>>>>>>>>>>> before we >>>>>>>>>>>> ship. >>>>>>>>>>>> >>>>>>>>>>>> Will this feature be supported on all six Blink platforms >>>>>>>>>>>> (Windows, Mac, Linux, ChromeOS, Android, and Android WebView)? >>>>>>>>>>>> >>>>>>>>>>>> No. We plan to launch this on all Blink platforms except >>>>>>>>>>>> WebView. >>>>>>>>>>>> >>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>>>>>> ? >>>>>>>>>>>> >>>>>>>>>>>> We are exploring ways to test this feature via WPT. This isn’t >>>>>>>>>>>> possible today given the implementation-defined nature of blocked >>>>>>>>>>>> resources. Some explorations are discussed here >>>>>>>>>>>> <https://explainers-by-googlers.github.io/script-blocking/#testing> >>>>>>>>>>>> . >>>>>>>>>>>> >>>>>>>>>>>> Flag name on about://flags >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito >>>>>>>>>>>> >>>>>>>>>>>> Finch feature name >>>>>>>>>>>> >>>>>>>>>>>> EnableFingerprintingProtectionInIncognito >>>>>>>>>>>> >>>>>>>>>>>> Rollout plan >>>>>>>>>>>> >>>>>>>>>>>> (RARE) Experiment users ramp up over time >>>>>>>>>>>> >>>>>>>>>>>> Requires code in //chrome? >>>>>>>>>>>> >>>>>>>>>>>> False >>>>>>>>>>>> >>>>>>>>>>>> Tracking bug >>>>>>>>>>>> >>>>>>>>>>>> https://issues.chromium.org/issues/431761692 >>>>>>>>>>>> <https://issues.chromium.org/issues/370696608> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Launch bug >>>>>>>>>>>> >>>>>>>>>>>> https://launch.corp.google.com/launch/4367306 >>>>>>>>>>>> >>>>>>>>>>>> Estimated milestones >>>>>>>>>>>> >>>>>>>>>>>> Shipping on Desktop >>>>>>>>>>>> >>>>>>>>>>>> 140 >>>>>>>>>>>> >>>>>>>>>>>> Shipping on Android >>>>>>>>>>>> >>>>>>>>>>>> 140 >>>>>>>>>>>> >>>>>>>>>>>> Anticipated spec changes >>>>>>>>>>>> >>>>>>>>>>>> Open questions about a feature may be a source of future web >>>>>>>>>>>> compat or interop issues. Please list open issues (e.g. links to >>>>>>>>>>>> known >>>>>>>>>>>> github issues in the project for the feature specification) whose >>>>>>>>>>>> resolution may introduce web compat/interop risk (e.g., changing >>>>>>>>>>>> to naming >>>>>>>>>>>> or structure of the API in a non-backward-compatible way). >>>>>>>>>>>> >>>>>>>>>>>> None >>>>>>>>>>>> >>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>> >>>>>>>>>>>> https://chromestatus.com/feature/5188989497376768 >>>>>>>>>>>> >>>>>>>>>>>> Links to previous Intent discussions >>>>>>>>>>>> >>>>>>>>>>>> Intent to Experiment: >>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/NJvGkSvLk8I?e=48417069 >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>>>> To view this discussion visit >>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com >>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>> . >>>>>>>>>> >>>>>>>>> -- >>>>>>>> You received this message because you are subscribed to the Google >>>>>>>> Groups "blink-dev" group. >>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>> To view this discussion visit >>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjGDTA_6ONhuHAxhg7yi-n9kC2y9JdL5nXtUzjb3FXd2Q%40mail.gmail.com >>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjGDTA_6ONhuHAxhg7yi-n9kC2y9JdL5nXtUzjb3FXd2Q%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>> . >>>>>>>> >>>>>>> -- >>>>>> You received this message because you are subscribed to the Google >>>>>> Groups "blink-dev" group. >>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>> To view this discussion visit >>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsieQ5z%3DKQEOQ_ELRSXHW1-agGASiD0aaVpkCku_BR%2BL%2Bg%40mail.gmail.com >>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsieQ5z%3DKQEOQ_ELRSXHW1-agGASiD0aaVpkCku_BR%2BL%2Bg%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>> . >>>>>> >>>>> -- >>>>> You received this message because you are subscribed to the Google >>>>> Groups "blink-dev" group. >>>>> To unsubscribe from this group and stop receiving emails from it, send >>>>> an email to blink-dev+unsubscr...@chromium.org. >>>>> >>>> To view this discussion visit >>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw-WO%3DLD3JeHnD3Bz%2BfO2YACZfFaaCAv2VzERBNP23fmNw%40mail.gmail.com >>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw-WO%3DLD3JeHnD3Bz%2BfO2YACZfFaaCAv2VzERBNP23fmNw%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>> . >>>>> >>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKXHy%3DeX3%3DUG8acCZ%2B%3DBimN9vT%2BXMtWdBOAp0ZaBL9VZF7isUw%40mail.gmail.com.