(sorry for previous typos)

Per today's API OWNERS meeting, this intent is being held until Yoav's 
questions are resolved. I don't expect that this will be delayed long, and 
stakeholders will meet soon and update this thread with resolutions.

Best,

Alex

On Wednesday, July 23, 2025 at 7:42:41 AM UTC+1 Yoav Weiss wrote:

> Some questions 
> <https://groups.google.com/a/chromium.org/g/blink-dev/c/NJvGkSvLk8I/m/4mJ-u25GAgAJ>
>  I 
> asked on the I2E are still left unanswered.
>
> Overall, I think this feature will cause interop issues *by definition*, 
> at least for the 57 domains on the list that are marked as "some URLs are 
> affected". 
> I'd appreciate it if y'all can hold back on shipping this until this is 
> further discussed at the API owners meeting.
>
> On Tue, Jul 22, 2025 at 5:51 PM Mike West <mk...@chromium.org> wrote:
>
>> Ok, it sounds like you're asking for something conceptually similar to 
>> https://learn.microsoft.com/en-us/microsoft-edge/web-platform/tracking-prevention?
>>  
>> I think we can pull that together.
>>
>> Thanks for the suggestion!
>>
>> -mike
>>
>>
>> On Tue, Jul 22, 2025 at 4:00 PM Alex Russell <slightly...@chromium.org> 
>> wrote:
>>
>>> Nothing first that I'm not asking from an Edge perspective (we have the 
>>> resources to follow along with most things y'all do), a sketch for how a 
>>> small browser might implement bloxking using the same list y'all do would 
>>> be enough for me.
>>>
>>> Thanks!
>>>
>>> On Tue, Jul 22, 2025, 11:47 AM Mike West <mk...@google.com> wrote:
>>>
>>>> Hey Alex! Thanks for your feedback (and LGTM :) )!
>>>>
>>>> On documentation: we have a PR up against Fetch at 
>>>> https://github.com/whatwg/fetch/pull/1840 which aims to clarify the 
>>>> timing and web-facing impact of a blocking decision, and the list of 
>>>> affected domains is up at 
>>>> https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md.
>>>>  
>>>> What additional documentation would you like to see that would improve 
>>>> consistency across vendors?
>>>>
>>>> That said, I think we have to broadly accept that different vendors are 
>>>> going to make different decisions about which resources they allow to load 
>>>> in a given context. This is already the case from a security perspective 
>>>> with choices between Safe Browsing and SmartScreen, and is already the 
>>>> case 
>>>> from a privacy perspective with decisions around subsetting blocklist 
>>>> vendors' lists which vary given each user agent's priorities and risk 
>>>> tolerance. I don't think it's likely that there's going to be alignment on 
>>>> a single list in the near-term. That doesn't seem fatal to me, as long as 
>>>> we agree on the web-facing impact. Does that more or less align with your 
>>>> view, or should we be aiming for a different compatibility bar in the long 
>>>> run?
>>>>
>>>> -mike
>>>>
>>>>
>>>> On Tue, Jul 22, 2025 at 12:07 PM Alex Russell <slightly...@chromium.org> 
>>>> wrote:
>>>>
>>>>> I remain concerned that this behaviour isn't going to be shared by 
>>>>> other Chromium-based browsers. Web Platform behaviour differences between 
>>>>> our implementations opens up risks of ongoing divergence, and so I'm 
>>>>> going 
>>>>> to LGTM3 on the condition that documentation is produced for other 
>>>>> embedders that wish to adopt the same behaviour in a straightforward way.
>>>>>
>>>>> Best,
>>>>>
>>>>> Alex
>>>>>
>>>>> On Wednesday, July 16, 2025 at 6:39:57 PM UTC+1 Philip Jägenstedt 
>>>>> wrote:
>>>>>
>>>>>> LGTM2
>>>>>>
>>>>>> On Wed, Jul 16, 2025 at 5:55 PM Chris Harrelson <
>>>>>> chris...@chromium.org> wrote:
>>>>>>
>>>>>>> Ok, thanks for clarifying.
>>>>>>>
>>>>>>> LGTM1
>>>>>>>
>>>>>>> On Wed, Jul 16, 2025 at 8:51 AM 'Zainab Rizvi' via blink-dev <
>>>>>>> blink-dev@chromium.org> wrote:
>>>>>>>
>>>>>>>> Hi Chris! We will have a few UI indicators when a resource is 
>>>>>>>> blocked:
>>>>>>>>
>>>>>>>> 1. The "eye" icon will show up in the Omnibox that will allow users 
>>>>>>>> to disable the feature on a particular top-level site. 
>>>>>>>> 2. There is a toggle in settings for users to disable the feature 
>>>>>>>> entirely.
>>>>>>>> 3. For developers, a dedicated issue will pop up in the "Issues" 
>>>>>>>> tab. 
>>>>>>>> 4. For developers, there is a dedicated network error 
>>>>>>>> <https://source.chromium.org/chromium/chromium/src/+/main:net/base/net_error_list.h;l=136?q=BLOCKED_BY_FINGER&sq=&ss=chromium>
>>>>>>>>  in 
>>>>>>>> the "Network" tab. 
>>>>>>>>
>>>>>>>> On Wed, Jul 16, 2025 at 11:32 AM Chris Harrelson <
>>>>>>>> chris...@chromium.org> wrote:
>>>>>>>>
>>>>>>>>> In case of something breaking: When a script is blocked, is the 
>>>>>>>>> user able to find that out in a site settings dialog?
>>>>>>>>>
>>>>>>>>> On Tue, Jul 15, 2025 at 7:59 AM 'Zainab Rizvi' via blink-dev <
>>>>>>>>> blink-dev@chromium.org> wrote:
>>>>>>>>>
>>>>>>>>>> Yes, though Script Blocking in Incognito would have the same 
>>>>>>>>>> observable effect as extensions that block resources, such as ad 
>>>>>>>>>> blockers. 
>>>>>>>>>> The team is also adding monitoring to see if incognito detectability 
>>>>>>>>>> is on 
>>>>>>>>>> the rise due to these features.  
>>>>>>>>>>
>>>>>>>>>> On Mon, Jul 14, 2025 at 7:23 PM Gregg Tavares <g...@chromium.org> 
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> Does this enable more detection of incognito mode by sites? 
>>>>>>>>>>>
>>>>>>>>>>> On Mon, Jul 14, 2025 at 1:08 PM 'Zainab Rizvi' via blink-dev <
>>>>>>>>>>> blink-dev@chromium.org> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Hi, Alex! This will only be enabled for Chrome's Incognito 
>>>>>>>>>>>> mode. 
>>>>>>>>>>>>
>>>>>>>>>>>> On Mon, Jul 14, 2025 at 2:19 PM Alex Russell <
>>>>>>>>>>>> slightly...@chromium.org> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Will this be enabled for all Chromium browsers by default?
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Monday, July 14, 2025 at 8:54:57 AM UTC-7 riz...@google.com 
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> Contact emails
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> riz...@google.com, mk...@chromium.org
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Explainer
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> https://github.com/explainers-by-googlers/script-blocking 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Specification
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> https://github.com/whatwg/fetch/pull/1840
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Summary
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Mitigating API Misuse for Browser Re-Identification, 
>>>>>>>>>>>>>> otherwise known as Script Blocking, is a feature that will block 
>>>>>>>>>>>>>> scripts 
>>>>>>>>>>>>>> engaging in known, prevalent techniques for browser 
>>>>>>>>>>>>>> re-identification in 
>>>>>>>>>>>>>> third-party contexts. These techniques typically involve the 
>>>>>>>>>>>>>> misuse of 
>>>>>>>>>>>>>> existing browser APIs to extract additional information about 
>>>>>>>>>>>>>> the user's 
>>>>>>>>>>>>>> browser or device characteristics.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> To strike this balance between protection and usability, this 
>>>>>>>>>>>>>> proposal focuses on blocking scripts in a third-party context in 
>>>>>>>>>>>>>> Incognito 
>>>>>>>>>>>>>> mode, enhancing Incognito's protections against cross-site 
>>>>>>>>>>>>>> tracking when 
>>>>>>>>>>>>>> users choose to browse in this mode.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> This proposal uses a list-based approach, where only domains 
>>>>>>>>>>>>>> marked as “Impacted by Script Blocking” on the Masked Domain 
>>>>>>>>>>>>>> List 
>>>>>>>>>>>>>> <https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md>
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>> (MDL) in a third-party context will be impacted.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> When the feature is enabled, Chrome will check network 
>>>>>>>>>>>>>> requests against the blocklist.  This feature will reuse 
>>>>>>>>>>>>>> Chromium's 
>>>>>>>>>>>>>> subresource_filter component, which is responsible for tagging 
>>>>>>>>>>>>>> and 
>>>>>>>>>>>>>> filtering subresource requests based on page-level activation 
>>>>>>>>>>>>>> signals and a 
>>>>>>>>>>>>>> ruleset used to match URLs for filtering. 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 1% Experiment Summary
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Our 1% stable Incognito experiment did not show any 
>>>>>>>>>>>>>> statistically significant movement for Incognito-specific Core 
>>>>>>>>>>>>>> Web Vitals. 
>>>>>>>>>>>>>> Furthermore, we did not receive any breakage reports pertaining 
>>>>>>>>>>>>>> to this 
>>>>>>>>>>>>>> experiment.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> As the feature is only enabled for third party resources in 
>>>>>>>>>>>>>> Incognito sessions, the sample size is smaller than we typically 
>>>>>>>>>>>>>> observe in 
>>>>>>>>>>>>>> a 1% experiment. We plan to carefully ramp the experiment to 
>>>>>>>>>>>>>> evaluate 
>>>>>>>>>>>>>> performance and stability impact before launching to Incognito 
>>>>>>>>>>>>>> 100%.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Blink component
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Blink>Network>FetchAPI 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> TAG review
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/1114
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> TAG review status
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Closed (resolution: decline)
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Risks
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> There shouldn’t be any interop concerns. 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> In terms of compatibility, this feature is anticipated to 
>>>>>>>>>>>>>> have an impact on websites that rely on scripts from domains 
>>>>>>>>>>>>>> identified as 
>>>>>>>>>>>>>> serving fingerprinting techniques. Sites that integrate 
>>>>>>>>>>>>>> third-party scripts 
>>>>>>>>>>>>>> from identified domains may experience functional breakage or 
>>>>>>>>>>>>>> render 
>>>>>>>>>>>>>> incorrectly when accessed in Incognito mode. We are attempting 
>>>>>>>>>>>>>> to mitigate 
>>>>>>>>>>>>>> this risk by applying temporary exceptions if we determine that 
>>>>>>>>>>>>>> the 
>>>>>>>>>>>>>> intervention on a particular domain may cause significant user 
>>>>>>>>>>>>>> experience 
>>>>>>>>>>>>>> impact.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Gecko: No signal
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> WebKit: Shipped/Shipping Safari has a similar feature as 
>>>>>>>>>>>>>> part of "Intelligent Tracking Prevention" (ITP)
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Firefox: Shipped/Shipping Firefox has a similar feature as 
>>>>>>>>>>>>>> part of "Enhanced Tracking Protection" 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Web developers: <will fill out after explainer publication> 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> WebView application risks
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Does this intent deprecate or change behavior of existing 
>>>>>>>>>>>>>> APIs, such that it has potentially high risk for Android 
>>>>>>>>>>>>>> WebView-based 
>>>>>>>>>>>>>> applications?
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> No, we are not proposing to ship this on WebView.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> We have added support in DevTools Issues to indicate which 
>>>>>>>>>>>>>> requests are being blocked by this feature.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> We also have 
>>>>>>>>>>>>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito
>>>>>>>>>>>>>>  which 
>>>>>>>>>>>>>> developers and users can use for testing suspected breakage even 
>>>>>>>>>>>>>> before we 
>>>>>>>>>>>>>> ship.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Will this feature be supported on all six Blink platforms 
>>>>>>>>>>>>>> (Windows, Mac, Linux, ChromeOS, Android, and Android WebView)?
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> No. We plan to launch this on all Blink platforms except 
>>>>>>>>>>>>>> WebView.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests 
>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>>>>>>>>> ?
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> We are exploring ways to test this feature via WPT. This 
>>>>>>>>>>>>>> isn’t possible today given the implementation-defined nature of 
>>>>>>>>>>>>>> blocked 
>>>>>>>>>>>>>> resources. Some explorations are discussed here 
>>>>>>>>>>>>>> <https://explainers-by-googlers.github.io/script-blocking/#testing>
>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Flag name on about://flags
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Finch feature name
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> EnableFingerprintingProtectionInIncognito
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Rollout plan
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> (RARE) Experiment users ramp up over time
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Requires code in //chrome?
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> False
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Tracking bug
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> https://issues.chromium.org/issues/431761692 
>>>>>>>>>>>>>> <https://issues.chromium.org/issues/370696608>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Launch bug
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> https://launch.corp.google.com/launch/4367306 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Shipping on Desktop
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 140
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Shipping on Android
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 140
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Anticipated spec changes
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Open questions about a feature may be a source of future web 
>>>>>>>>>>>>>> compat or interop issues. Please list open issues (e.g. links to 
>>>>>>>>>>>>>> known 
>>>>>>>>>>>>>> github issues in the project for the feature specification) 
>>>>>>>>>>>>>> whose 
>>>>>>>>>>>>>> resolution may introduce web compat/interop risk (e.g., changing 
>>>>>>>>>>>>>> to naming 
>>>>>>>>>>>>>> or structure of the API in a non-backward-compatible way).
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> None
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> https://chromestatus.com/feature/5188989497376768 
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Links to previous Intent discussions
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Intent to Experiment: 
>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/NJvGkSvLk8I?e=48417069
>>>>>>>>>>>>>>  
>>>>>>>>>>>>>>
>>>>>>>>>>>>> -- 
>>>>>>>>>>>> You received this message because you are subscribed to the 
>>>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from 
>>>>>>>>>>>> it, send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>>>>>>> To view this discussion visit 
>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com
>>>>>>>>>>>>  
>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>> .
>>>>>>>>>>>>
>>>>>>>>>>> -- 
>>>>>>>>>> You received this message because you are subscribed to the 
>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>> To unsubscribe from this group and stop receiving emails from it, 
>>>>>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>>>>> To view this discussion visit 
>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjGDTA_6ONhuHAxhg7yi-n9kC2y9JdL5nXtUzjb3FXd2Q%40mail.gmail.com
>>>>>>>>>>  
>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjGDTA_6ONhuHAxhg7yi-n9kC2y9JdL5nXtUzjb3FXd2Q%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>> .
>>>>>>>>>>
>>>>>>>>> -- 
>>>>>>>> You received this message because you are subscribed to the Google 
>>>>>>>> Groups "blink-dev" group.
>>>>>>>> To unsubscribe from this group and stop receiving emails from it, 
>>>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>>> To view this discussion visit 
>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsieQ5z%3DKQEOQ_ELRSXHW1-agGASiD0aaVpkCku_BR%2BL%2Bg%40mail.gmail.com
>>>>>>>>  
>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsieQ5z%3DKQEOQ_ELRSXHW1-agGASiD0aaVpkCku_BR%2BL%2Bg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>> .
>>>>>>>>
>>>>>>> -- 
>>>>>>> You received this message because you are subscribed to the Google 
>>>>>>> Groups "blink-dev" group.
>>>>>>> To unsubscribe from this group and stop receiving emails from it, 
>>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>>
>>>>>> To view this discussion visit 
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw-WO%3DLD3JeHnD3Bz%2BfO2YACZfFaaCAv2VzERBNP23fmNw%40mail.gmail.com
>>>>>>>  
>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw-WO%3DLD3JeHnD3Bz%2BfO2YACZfFaaCAv2VzERBNP23fmNw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>> .
>>>>>>>
>>>>>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to blink-dev+unsubscr...@chromium.org.
>>
> To view this discussion visit 
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKXHy%3DeX3%3DUG8acCZ%2B%3DBimN9vT%2BXMtWdBOAp0ZaBL9VZF7isUw%40mail.gmail.com
>>  
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKXHy%3DeX3%3DUG8acCZ%2B%3DBimN9vT%2BXMtWdBOAp0ZaBL9VZF7isUw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c3457e4f-2d31-4d25-94f8-4ad9dfe9a764n%40chromium.org.

Reply via email to