zlacker

[return to "Web Environment Integrity API Proposal"]
1. Rupert+G12[view] [source] 2023-07-22 10:37:59
>>reacto+(OP)
Proposal author here

I’m hoping to get back to everyone as soon as possible. I hope you can all appreciate that I’m a human being and this has been a lot!

In the mean time, I wanted to repost my last comment on the GitHub issue thread [1]:

Hey all, we plan to respond to your feedback but I want to be thorough which will take time and it’s the end of a Friday for me. We wanted to give a quick TL;DR:

- This is an early proposal that is subject to change based on feedback.

- The primary goal is to combat user tracking by giving websites a way to maintain anti-abuse protections for their sites without resorting to invasive fingerprinting.

- It’s also an explicit goal to ensure that user agents can browse the web without this proposal [2]

- The proposal doesn’t involve detecting or blocking extensions, so ad-blockers and accessibility tools are out of scope.

- This is not DRM - WEI does not lock down content

- I’m giving everyone a heads up that I’m limiting comments to contributors over the weekend so that I can try to take a breath away from GitHub. I will reopen them after the weekend

[1] https://github.com/RupertBenWiser/Web-Environment-Integrity/...

[2] https://github.com/RupertBenWiser/Web-Environment-Integrity/...

◧◩
2. tetrep+d32[view] [source] 2023-07-22 10:57:21
>>Rupert+G12
> It’s also an explicit goal to ensure that user agents can browse the web without this proposal

How, in an information theory sense, can you stop website operators from using this attestation information to block subsets of users? The "holdback" mentioned in your reference link seems like an optional thing, as if we're concerned about good faith actors rather than the opposite.

It would be nice if the spec included examples of how a hypothetical bad actor couldn't abuse the spec to block non-attestors. i.e. How do we stop "this website only works in Chrome on Windows" but for attestation? Right now, it's trivial to "fix" because we can lie about our environment (it's likely just reading our User-Agent) and it's unlikely that the website will actually not work in other OS/browser contexts.

Some websites really do only work in certain contexts, but I think critics' concern is what happens when the website would work perfectly fine, but it refuses to. I think this is largely the same concerns people have with mobile app permissions, but those can be gatekeeped by mobile app stores who can enforce political goals such as "You can't ask for permissions you don't need and refuse to work when you don't get them", websites have no such constraints.

What's to stop websites from blocking random users now? Nothing, really. But we don't have to bypass any cryptographic attestations in order to try to work around those blocks. This spec seeks to stop that.

[go to top]