-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prompt Spam where First Party Sets are not Used #2
Comments
Thanks for cutting the issue! To summarize the prompt spam prevention possibilities besides FPS discussed elsewhere:
The latest comment then adds:
I assume this is some rule like (with "match" possibly also meaning same site or same origin): i.e., I’d be curious about whether there's any concern with CDN URLs (where a script authored by the top-level site but hosted on a CDN may be incorrectly blocked), and with bundled JS (where the true caller might be obscured, though the top-level site’s bundling of it may indicate approval), though I do think it is another good possibility. |
I was actually thinking some rule like: i.e., The idea is to indicate an acceptance by |
We discussed this issue a bit at TPAC, and I'm posting a summary below to ensure it matches @bvandersloot-mozilla's recollection (hopefully I didn't garble the message 😄):
Does this match your recollection? Thanks again for all the discussion and feedback! |
I would replace "non-FPS browsers" with Firefox, but otherwise I agree. Some other browsers are opposed to promptless storage access grants and may also be opposed to FPS. This puts them in a tough situation that I think we left unresolved and wanting a broader conversation on. Otherwise this matches my recollection. Thank you for the write up! |
There is concern that prompt spam will be a problem where first party sets are not adopted. See prior discussion on privacy-cg/storage-access#107. Forking here.
The text was updated successfully, but these errors were encountered: