Hi Adam, Thank you for the detailed feedback. I'm discussing with the team and will follow up here.
Thanks, Johann On Tue, Dec 5, 2023, 17:17 Adam Gertenbach <agertenb...@axisgroup.com> wrote: > Good morning all, > > Our organization is currently re-reviewing the impacts of the third party > cookie deprecation now that registration for deprecation trials have been > made available. Among our offerings, we provide consulting, hosting, > architecture, and development services for customers in the business > intelligence and enterprise analytics space, including Microsoft Power BI, > Qlik Sense, ThoughtSpot, and Tableau. The ability to provide embedding of > analytics capabilities, such as visualizations and dashboards, is common > across the industry and is supported by each of the major vendors; as such, > we've facilitated these capabilities in architecting and building solutions > for our customers, often using these embedding capabilities to create > custom solutions or enhance enterprise portals that have seen very large > adoption. > > > https://help.qlik.com/en-US/sense-developer/November2023/Content/Sense_Helpsites/embed-qlik-sense.htm > > https://learn.microsoft.com/en-us/power-bi/collaborate-share/service-embed-secure > https://docs.thoughtspot.com/cloud/latest/intro-embed > https://help.tableau.com/current/pro/desktop/en-us/embed.htm > > As one might expect, these embedded solutions are often reliant on a > combination of iframes and cross domain third-party cookies to supply > authentication and authorization and cannot be made to operate under a > single domain. While we intend to actively engage with these vendors to > notify them of expected breakage due to the pending deprecation and would > hope that options for partitioning/CHIPS will make its way into these > products in a timely fashion, there is a significant risk that existing > solutions will be impacted in the interim period; furthermore, the customer > perception around this breakage is likely to impact our reputation based on > our role in delivery, despite the fact that we do not and cannot directly > resolve the underlying cause without third-party participation and product > updates. > > Historically, resolution of these types of issues have not always been > proactive. Qlik Sense had to update their interfaces as the SameSite None > rollout was occurring due to customer breakage ( > https://community.qlik.com/t5/Official-Support-Articles/Missing-SameSite-attribute-blocks-requests-in-Chrome-80-and/ta-p/1712551 > ). More recently, Microsoft's Power BI login process for embedded reports > broke in September when the third-party storage partitioning policies were > enabled due to their use of cross-window localStorage usage for signaling > during authentication. Not knowing that this was in use by their product, > mitigation of this issue involved an all-nighter investigation on our part > to understand what was happening and the enrollment of a first-party > deprecation trial by us to re-enable services for our customers. > > While I recognize the motivations behind the strategies outlined, the lack > of a first-party deprecation trial to provide wide-spread temporary > mitigation is likely to significantly impair our service offerings and > existing customer solutions while these issues are ironed out and > implemented by these vendors. We're hoping to prepare our customers through > proactive messaging where possible (enterprise policy, anticipated per-user > UI overrides, etc.) but I'd like to call out this scenario and see if > there's anything I'm missing in terms of short-term solutions available to > us, and to ask if a first-party deprecation trial offering is expected for > cases like these where influence on the owners of third-party embeds is > limited. > > On Tuesday, November 21, 2023 at 7:56:58 PM UTC-5 Rick Byers wrote: > >> LGTM2 - It's time. >> >> Given that this is our biggest breaking change ever and I've gotten some >> feedback saying at least a couple people appreciate it when I expand on my >> thought process in compat analysis, I figured I should take the time to try >> to systematically evaluate this against our blink compat principles >> <https://docs.google.com/document/d/1RC-pBBvsazYfCNNUSkPqAVpSpNJ96U8trhNkfV0v9fk/edit#heading=h.83o2xr8ayal6>. >> Hopefully we'll learn some things from how this deprecation goes in >> practice to help us further improve our framework for evaluating and >> mitigating future compat risk. >> >> - *Minimizing end-user impact* >> - *Page views impacted: High risk* >> - The UseCounter >> <https://chromestatus.com/metrics/feature/timeline/popularity/3408> >> has been steady at around 46% for years. Clearly a huge risk from >> our first >> line of reasoning. >> - *Unique sites impacted: High risk* >> - I don't have a pointer to data handy, but I assume it's also >> very large (eg. due to 3p embeds like ads). >> - *Severity of breakage: Moderate risk* >> - One argument is that most sites already need to work for all >> the Safari and Firefox users and the X% of Chrome users with 3P >> cookies >> disabled, and so have adapted. >> - But on the other hand we have plenty of examples of sites >> which just tell users they must enable 3PCs to make the site >> function at >> all. >> - So I think we have to say that there are a non-trivial number >> sites where the severity is total site breakage - necessitating all >> the >> mitigations, even if most impacted sites have non-visible breakage. >> - *Chrome's release process: Moderate mitigation* >> - This change is under very careful finch control with tons of >> monitoring. >> - We also have a variety of feedback channels including the >> manual breakage reporting Johann mentioned, as well as monitoring >> of user >> behavior to infer breakage, and a pretty big team motivated to react >> quickly to keep user impact to a minimum. >> - One thing to be mindful of here is that the CMA-mandated 1% >> experiment will place some limits on the team's options to respond >> to >> reports of breakage (eg. the deprecation trial says it can't be >> used by >> sites on the disconnect.me advertising list). >> - *User opt-out: Very strong mitigation* >> - I've been playing with the cookie control UI (eg. see >> screenshot below) on my personal account and I'm quite happy with >> it. I've >> seen the user education directing me to this UI including in >> scenarios like >> when I reload a page. Some of that may be experiments or things >> undergoing >> design change (I don't actually know the specific plans, just >> commenting on >> what I've experienced personally), but it gives me confidence that >> the team >> is seriously working to educate users on how to opt-out in the case >> of >> breakage. >> [image: image.png] >> - *Maximizing user experience* >> - *Security & Privacy: Strong mitigation* >> - Personally it seems clear to me (and eg. the W3C TAG >> <https://www.w3.org/2001/tag/doc/web-without-3p-cookies>) that >> 3PCs being off is the right long-term default for the web in the >> name of >> privacy. >> - In addition I believe there's some security benefit - eg. >> making side-channel attacks for sharing data between frames less >> useful to >> attackers >> - *Performance: Weak mitigation* >> - You could argue that sites will be faster without 3PCs, but I >> suspect that's temporary. >> - Perhaps more importantly, the deprecation of 3PCs creates >> pressure to raise the level of abstraction of the web and I think >> history >> has shown that we can make the web faster the more sites operate at >> a >> higher level of abstraction (eg. consider scrolling/animation being >> JS-driven vs. browser-driven and the rise of threaded compositing >> with >> mobile browsers and how web advertising might look 5-10 years from >> now). >> - *User annoyance: Weak mitigation* >> - Maybe a risk of some increase in annoyance - eg. need popups >> for some things that used to work in-page via iframes. >> - Certainly having to turn 3PCs back on for a site that doesn't >> work otherwise will be annoying >> - I'd also argue that, like for performance, raising the level >> of abstraction will give us more opportunity to reduce annoyance. >> Eg. users >> will have more centralized and consistent control over their >> advertising >> preferences. >> - *Minimizing web-developer impact* >> - *Ease of adaptation: Moderate mitigation* >> - Key functional scenarios like identity have well known and >> long-used alternatives like pop-ups and redirects. Chrome adopting >> the >> temporary heuristics already used successfully by other browsers >> seems like >> a significant mitigation for these flows to me. >> - The requestStorageAccess API is a drop-in option in many >> scenarios (again, already deployed for other browsers) >> - Advertising use cases require a lot more work to adapt to, >> but massive effort has gone into (and will presumably keep going >> into) >> building and validating these alternatives. >> - *Developer opt-in / opt-out: Strong mitigation* >> - The deprecation trial seems like a big mitigation to me - >> pretty easily giving non-ads origins an extra year. >> - The prior move to require SameSite=None also seems like a >> significant mitigation, developers have effectively been opting >> into 3PCs >> in chromium for three years! >> - There's also been an effort to variety of mechanisms and >> tools for developers to opt-in to 3PCD and validate their site works >> - *Enterprise policy opt-out: Moderate mitigation* >> - Policy control exists. Given the scope of potential impact in >> enterprises, this still seems like an area of some risk to me (eg. >> BYOD >> scenarios with Chromium-only custom apps). But again the user >> opt-out is a >> huge mitigation for this risk. >> - *Debuggability: Moderate mitigation* >> - Purpose-built tools A variety of tools have been built to >> help developers understand and adapt their cookie usage. Still >> cookies can >> be complicated, there's no silver bullet. >> - *Outreach: Moderate mitigation* >> - Almost certainly more outreach than we've ever done for a >> deprecation (even Flash!), yet still not so much as to avoid the >> likelihood of some developers being surprised. This is a place one >> could >> always argue for more work, but it's hard to know where the point of >> diminishing returns is, especially prior to the slow roll-out even >> starting. I expect this is something we'll learn more about during >> the 1% >> experiment period to guide the ramp-up process after that. >> - *Maximizing web ecosystem benefit* >> - *Interoperability: Strong mitigation* >> - The other two major engines have disabled 3PCs by default for >> some time. I'm personally uncomfortable with 3PC-related breakage >> being a >> reason why developers might encourage users to use chromium-based >> browsers. >> Restoring interoperability across browsers seems like strong >> motivation for >> accepting some risk here. >> - The team has gone the extra mile to advance specs, write WPTs >> and generally work to move the web away from UA-specific heuristics >> to a >> new likely interoperable and standardized state wrt. cookie behavior >> - *Standards conformance: Weak mitigation* >> - No standard requires 3PCD, but it seems likely that future >> web standards will be built under the assumption of 3PCs being >> unavailable >> (lots of such specs in development on a standards track) >> - *IP rights: Not relevant* >> - *Accepted interop risk: Not relevant* >> >> Overall it seems to me like the high risks are appropriately balanced by >> significant mitigations and justifications for accepting the cost of the >> risk. More importantly, every technical tool in our web compat toolbox has >> been brought to bear on mitigating the risks, and significant resources are >> devoted to monitoring and responding to any issues. I both trust the team >> to effectively manage the risk during roll-out and expect that there will >> be some bumps and mistakes that we will want to learn from. >> >> Best of luck! >> Rick >> >> On Wed, Nov 15, 2023 at 5:43 PM Johann Hofmann <joha...@chromium.org> >> wrote: >> >>> Hi Daniel, >>> >>> On Wed, Nov 15, 2023 at 6:09 PM Daniel Bratell <brat...@gmail.com> >>> wrote: >>> >>>> You say Q1 2024, but do you know a more exact date? I ask because we >>>> are entering the holiday freeze period when companies do no changes >>>> whatsoever and even if this makes a site want to fix something, they might >>>> not be able to until some time into the quarter. >>>> >>> >>> we're currently planning for early Jan, i.e. M120 would be the first >>> release that contains the technical capabilities to ramp to 1% (breakage >>> mitigations, quantitative testing). The holiday freeze is definitely a risk >>> to call out here. However, as mentioned in the intent, we're already >>> operating under the assumption that some sites, despite our outreach >>> efforts, will only find out about this once the deprecation begins. To help >>> with that, we have a number of temporary mitigations available that work >>> quickly and effectively and can be initiated by various stakeholders in >>> this process (site, user, browser). While not directly relevant to the web >>> platform pieces, we plan to have user interface controls to give temporary >>> exceptions per top-level site in Chrome. >>> >>>> >>>> I also think it might be good to split it into the 1% part, and a 100% >>>> part since it is hard to judge the web compatibility level already and that >>>> is part of what the 1% run will do. >>>> >>> >>> The 1% is a long-running testing period that we're doing as part of the >>> commitments we entered with the CMA. However, from a readiness / web >>> platform perspective, we'd really like to treat it with the same >>> seriousness and care that we would treat a full rollout, as 1% of users >>> (over a significant amount of time) should not have a greatly degraded user >>> experience. We're trying to ship the full array of breakage mitigations we >>> will have available for potential future rollouts in this phase as well. >>> >>> So, if possible, I'd prefer to discuss any concerns you might have about >>> web compatibility, mitigations and ecosystem readiness in this thread, >>> rather than pushing it further out. :) >>> >>> Thanks, >>> >>> Johann >>> >>> >>>> /Daniel >>>> On 2023-11-13 17:52, David Dabbs wrote: >>>> >>>> Thanks for the explanation. >>>> >>>> David >>>> >>>> >>>> On Monday, November 13, 2023 at 9:30:55 AM UTC-6 Johann Hofmann wrote: >>>> >>>>> Hey David, yeah, that was me trying to fix the entry not showing up on >>>>> API Owner dashboards. I don't think that was what fixed it though, so I >>>>> can >>>>> change it back to "In Developer Trial" (which feels like the most accurate >>>>> right now?) >>>>> >>>>> Thanks! >>>>> >>>>> Johann >>>>> >>>>> >>>>> On Mon, Nov 13, 2023, 16:10 David Dabbs <david...@epsilon.com> wrote: >>>>> >>>>>> This morning's Implementation status change to *Deprecated* results >>>>>> in >>>>>> >>>>>> Deprecate Third-Party Cookies >>>>>> <https://chromestatus.com/feature/5133113939722240> (Deprecated) >>>>>> >>>>>> Did you intend to also rename the feature to "Third-Party Cookies?" >>>>>> >>>>>> >>>>>> Thanks >>>>>> >>>>>> >>>>>> >>>>>> On Monday, November 13, 2023 at 4:20:47 AM UTC-6 yoav...@chromium.org >>>>>> wrote: >>>>>> >>>>>>> LGTM1 >>>>>>> >>>>>>> I cannot imagine a more thorough and thoughtful approach than the >>>>>>> one the Privacy Sandbox team has taken to tackle this significant >>>>>>> change to >>>>>>> the web's privacy model while minimizing breakage and providing >>>>>>> replacement >>>>>>> APIs. Thanks for pushing this important work through!! >>>>>>> >>>>>>> On Mon, Nov 13, 2023 at 10:31 AM Johann Hofmann < >>>>>>> joha...@chromium.org> wrote: >>>>>>> >>>>>>>> Contact emails >>>>>>>> >>>>>>>> joha...@chromium.org, wande...@chromium.org, dylan...@chromium.org, >>>>>>>> kaust...@chromium.org, jka...@chromium.org, john...@chromium.org >>>>>>>> >>>>>>>> Explainer >>>>>>>> >>>>>>>> For general information on Privacy Sandbox for the Web and Google’s >>>>>>>> plans to phase out third-party cookies, see >>>>>>>> https://privacysandbox.com/open-web/. >>>>>>>> >>>>>>>> For additional information on the planned semantics of third-party >>>>>>>> cookie blocking and its interaction with the SameSite cookie >>>>>>>> attribute, see >>>>>>>> https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics >>>>>>>> >>>>>>>> >>>>>>>> Specification >>>>>>>> >>>>>>>> The Cookies RFC contains some language >>>>>>>> <https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-rfc6265bis-12#name-the-cookie-header-field> >>>>>>>> that, in theory, allows user agents to block third-party cookies, >>>>>>>> leaving a >>>>>>>> lot of details unspecified. We are not happy with this status quo and >>>>>>>> are >>>>>>>> collaborating with other browsers on a significant spec refactoring >>>>>>>> effort >>>>>>>> called cookie layering >>>>>>>> <https://github.com/httpwg/http-extensions/issues/2084> to give >>>>>>>> Fetch/HTML more responsibility over specifying how and when cookies are >>>>>>>> stored and attached, as well as a WebAppSec Note based on our existing >>>>>>>> explainer >>>>>>>> <https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics> >>>>>>>> that describes how cookie blocking interacts with SameSite cookies. >>>>>>>> >>>>>>>> Summary >>>>>>>> >>>>>>>> We intend to deprecate and remove default access to third-party >>>>>>>> (aka cross-site) cookies as part of the Privacy Sandbox Timeline >>>>>>>> for the Web >>>>>>>> <https://privacysandbox.com/open-web/#the-privacy-sandbox-timeline>, >>>>>>>> starting with an initial 1% testing period in Q1 2024 >>>>>>>> <https://developer.chrome.com/docs/privacy-sandbox/chrome-testing/>, >>>>>>>> followed by a gradual phaseout planned to begin in Q3 2024 after >>>>>>>> consultation >>>>>>>> with the CMA >>>>>>>> <https://www.gov.uk/cma-cases/investigation-into-googles-privacy-sandbox-browser-changes> >>>>>>>> (The gradual phaseout is subject to addressing any remaining >>>>>>>> competition >>>>>>>> concerns of the UK’s Competition and Markets Authority.) >>>>>>>> >>>>>>>> Phasing out third-party cookies (3PCs) is a central effort to the >>>>>>>> Privacy Sandbox initiative, which aims to responsibly reduce cross-site >>>>>>>> tracking on the web (and beyond) while supporting key use cases >>>>>>>> through new >>>>>>>> technologies. Our phaseout plan was developed with the UK's >>>>>>>> Competition and >>>>>>>> Markets Authority, in line with the commitments >>>>>>>> <https://blog.google/around-the-globe/google-europe/path-forward-privacy-sandbox/> >>>>>>>> we offered for Privacy Sandbox for the web. >>>>>>>> >>>>>>>> Blink component >>>>>>>> >>>>>>>> Internals>Network>Cookies >>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ECookies> >>>>>>>> >>>>>>>> Motivation >>>>>>>> >>>>>>>> Our goal on the Privacy Sandbox is to reduce cross-site tracking >>>>>>>> while still enabling the functionality that keeps online content and >>>>>>>> services freely accessible by everyone. Deprecating and removing >>>>>>>> third-party cookies encapsulates the challenge, as they enable critical >>>>>>>> functionality across sign-in, fraud protection, advertising, and >>>>>>>> generally >>>>>>>> the ability to embed rich, third-party content in websites—but at the >>>>>>>> same >>>>>>>> time they're also a key enabler of cross-site tracking. >>>>>>>> >>>>>>>> Initial public proposal >>>>>>>> >>>>>>>> N/A >>>>>>>> >>>>>>>> TAG review >>>>>>>> >>>>>>>> The TAG has explicitly endorsed >>>>>>>> <https://w3ctag.github.io/web-without-3p-cookies/#why-restrict-third-party-cookies> >>>>>>>> (n.b. as a draft document) the deprecation of third-party cookies in >>>>>>>> the >>>>>>>> past. Additionally, we requested feedback on our proposal to >>>>>>>> define the 3PC security semantics >>>>>>>> <https://github.com/w3ctag/design-reviews/issues/904> and received >>>>>>>> generally positive feedback. >>>>>>>> >>>>>>>> TAG review status >>>>>>>> >>>>>>>> Tentatively Positive, see above >>>>>>>> >>>>>>>> Risks >>>>>>>> Compatibility >>>>>>>> >>>>>>>> Impact on the Ads ecosystem: >>>>>>>> >>>>>>>> A suite of APIs for delivering relevant ads, measuring ad >>>>>>>> performance, and preventing fraud and abuse are now generally >>>>>>>> available in >>>>>>>> Chrome to continue to facilitate ad-supported content on the web. We >>>>>>>> continue to work closely with the UK Competition and Markets Authority >>>>>>>> (CMA) on evaluating the impact of this change on the ads ecosystem. >>>>>>>> >>>>>>>> Web Compatibility: >>>>>>>> >>>>>>>> Despite 3PCs already being blocked in Firefox and Safari and >>>>>>>> developer outreach efforts to raise awareness and encourage developers >>>>>>>> to >>>>>>>> prepare for the deprecation, we currently estimate that a non-trivial >>>>>>>> number of sites are still relying on third-party cookies for some >>>>>>>> user-facing functionality. To address this breakage, we have developed >>>>>>>> a >>>>>>>> two-pronged strategy: >>>>>>>> >>>>>>>> >>>>>>>> 1. >>>>>>>> >>>>>>>> Breakage Discovery & Outreach >>>>>>>> >>>>>>>> Through various efforts, such as UKM-based signal analysis, scaled >>>>>>>> manual testing and dogfooding, we are collecting a list of impacted use >>>>>>>> cases. These individual breakage cases inform our mitigation strategy >>>>>>>> (see >>>>>>>> next step) and future API improvements, as well as our ongoing >>>>>>>> developer >>>>>>>> outreach efforts. >>>>>>>> >>>>>>>> We also offer developers the ability to report 3PC breakage to the >>>>>>>> Chrome team via goo.gle/report-3pc-broken or ask general questions >>>>>>>> at >>>>>>>> https://github.com/GoogleChromeLabs/privacy-sandbox-dev-support/issues >>>>>>>> . >>>>>>>> >>>>>>>> >>>>>>>> 1. >>>>>>>> >>>>>>>> Temporary Breakage Mitigation >>>>>>>> >>>>>>>> It will take time for developers to replace their usage of 3PCs >>>>>>>> with new APIs or different approaches, and some developers may not be >>>>>>>> aware >>>>>>>> of this deprecation until they discover breakage. In order to reduce >>>>>>>> the >>>>>>>> impact of such breakage on the web, we have implemented a series of >>>>>>>> temporary mitigations: >>>>>>>> >>>>>>>> >>>>>>>> - >>>>>>>> >>>>>>>> Exemption Heuristics >>>>>>>> >>>>>>>> <https://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md>: >>>>>>>> We are planning to ship heuristics mirroring those that already >>>>>>>> ship in >>>>>>>> Firefox and Safari, and are also working with both browsers on a >>>>>>>> coordinated removal process. Additional details can be found & >>>>>>>> should be >>>>>>>> discussed in the I2P >>>>>>>> >>>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/Eeh2pE0DRaE/m/1BJyBlCUAAAJ> >>>>>>>> & upcoming I2S. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> - >>>>>>>> >>>>>>>> Deprecation Trial: >>>>>>>> >>>>>>>> <https://developer.chrome.com/blog/cookie-countdown-2023oct/#request-additional-time-with-the-third-party-deprecation-trial-for-non-advertising-use-cases> >>>>>>>> This will be outlined in more detail in the upcoming Request for >>>>>>>> Deprecation Trial, but it’s important to note that a review step >>>>>>>> including >>>>>>>> evidence of user-facing breakage will be required for participation. >>>>>>>> Further, we do not intend to approve trials for ads-related use >>>>>>>> cases, to >>>>>>>> avoid interference with the quantitative testing. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> - >>>>>>>> >>>>>>>> As with other launches, we will also have a set of server-side >>>>>>>> controls to manage the rollout as a whole and minimize issues >>>>>>>> specific >>>>>>>> sites are causing for users. >>>>>>>> >>>>>>>> >>>>>>>> Despite all these efforts, we want to be clear that we are >>>>>>>> intentionally taking some risk here in the interest of user privacy. >>>>>>>> >>>>>>>> Enterprise Compatibility: >>>>>>>> >>>>>>>> To help with the transition, we intend to allow enterprise >>>>>>>> organizations to opt their applications out of third-party cookie >>>>>>>> blocking >>>>>>>> using the existing BlockThirdPartyCookies >>>>>>>> <https://chromeenterprise.google/policies/#BlockThirdPartyCookies> >>>>>>>> or CookiesAllowedForUrls >>>>>>>> <https://chromeenterprise.google/policies/#CookiesAllowedForUrls> >>>>>>>> policies. Given that enterprise systems are often gated and are >>>>>>>> therefore >>>>>>>> hard to analyze from an external perspective, these policies will >>>>>>>> provide >>>>>>>> additional time for the enterprise ecosystem to adapt. We intend to >>>>>>>> publish >>>>>>>> additional guidance for enterprises on >>>>>>>> https://goo.gle/3pcd-enterprise for the period beyond the 1% >>>>>>>> testing period. >>>>>>>> >>>>>>>> Interoperability >>>>>>>> >>>>>>>> Both Firefox and Safari have removed default access to third-party >>>>>>>> cookies already, though there are small differences >>>>>>>> <https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics> >>>>>>>> in how browsers treat SameSite=None cookies in so called “ABA” >>>>>>>> scenarios >>>>>>>> (site A embeds site B, which embeds site A again). Chrome ships the >>>>>>>> more >>>>>>>> secure and more restrictive variant, and from initial conversations we >>>>>>>> are >>>>>>>> optimistic that other browsers will adopt it as well. There are also >>>>>>>> subtle >>>>>>>> differences in how browsers restore access to third-party cookies >>>>>>>> through >>>>>>>> mechanisms such as heuristics or custom quirks. Where Chrome implements >>>>>>>> similar measures (such as the heuristics >>>>>>>> <https://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md>), >>>>>>>> we try to follow the launch and standards processes to achieve as much >>>>>>>> interop as we can, given other requirements such as privacy and >>>>>>>> security. >>>>>>>> >>>>>>>> Gecko: Shipping >>>>>>>> >>>>>>>> WebKit: Shipping >>>>>>>> >>>>>>>> Web developers: Mixed Signals >>>>>>>> >>>>>>>> As one of the most impactful changes to the web platform in a long >>>>>>>> time, the deprecation of 3rd party cookies and the introduction of >>>>>>>> alternative APIs have received a lot of helpful feedback from web >>>>>>>> developers to an extent impossible to summarize in a few sentences. As >>>>>>>> described in the summary, the Privacy Sandbox wants to ensure that a >>>>>>>> vibrant, freely accessible web can exist even as we roll out strong >>>>>>>> user >>>>>>>> protections and we will continue to work with web developers to >>>>>>>> understand >>>>>>>> their use cases and ship the right (privacy-preserving) APIs. And we’ve >>>>>>>> received feedback >>>>>>>> <https://privacysandbox.com/news/privacy-sandbox-for-the-web-reaches-general-availability/#:~:text=The%20Benefits%20of%20Collaboration> >>>>>>>> that gives us confidence that we’re on the right track. >>>>>>>> >>>>>>>> WebView application risks >>>>>>>> >>>>>>>> This deprecation will not affect WebView for now. >>>>>>>> >>>>>>>> >>>>>>>> Debuggability >>>>>>>> >>>>>>>> Developers may use the command-line testing switch >>>>>>>> --test-third-party-cookie-phaseout >>>>>>>> (available starting Chrome 115) or enable >>>>>>>> chrome://flags#test-third-party-cookie-phaseout (available >>>>>>>> starting Chrome 117), to simulate browser behavior with default access >>>>>>>> to >>>>>>>> third-party cookies removed. We also started reporting DevTools issues >>>>>>>> for >>>>>>>> cookies impacted by the deprecation starting in Chrome 117 to help >>>>>>>> identify >>>>>>>> potentially impacted workflows. We are continuing to improve our >>>>>>>> developer >>>>>>>> documentation >>>>>>>> <https://developer.chrome.com/blog/cookie-countdown-2023oct/> on >>>>>>>> debugging third-party cookies usage, and guidance on migration to new >>>>>>>> APIs. >>>>>>>> >>>>>>>> >>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>> ? >>>>>>>> >>>>>>>> Yes. We have put together a set of WPTs >>>>>>>> <https://wpt.fyi/results/cookies/third-party-cookies/third-party-cookies.tentative.https.html?label=experimental&label=master&aligned> >>>>>>>> which cover third-party cookie blocking for subresource requests. It >>>>>>>> is not >>>>>>>> yet comprehensive, we are working on adding additional tests to >>>>>>>> support our >>>>>>>> standardization efforts. >>>>>>>> >>>>>>>> Flag name on chrome://flags >>>>>>>> >>>>>>>> TestThirdPartyCookiePhaseout >>>>>>>> >>>>>>>> Finch feature name >>>>>>>> >>>>>>>> Due to the nature of the Chrome-facilitated testing period >>>>>>>> <https://developer.chrome.com/docs/privacy-sandbox/chrome-testing/>, >>>>>>>> as well as the general complexity of managing breakage related to >>>>>>>> removing >>>>>>>> third-party cookies, there won’t be a single Finch feature that takes >>>>>>>> us >>>>>>>> from 0% to 100% deprecated. Instead, a collection of features, >>>>>>>> supporting >>>>>>>> different phases and components, will be used. >>>>>>>> >>>>>>>> Non-finch justification >>>>>>>> >>>>>>>> N/A >>>>>>>> >>>>>>>> Requires code in //chrome? >>>>>>>> >>>>>>>> No, the base third-party cookie blocking functionality does not >>>>>>>> require Chrome code. Some custom Chrome functionality (such as the >>>>>>>> aforementioned facilitated testing, mitigations and user experience >>>>>>>> improvements) does require it. >>>>>>>> >>>>>>>> Estimated milestones >>>>>>>> >>>>>>>> Initial phase of Deprecation (1%) is planned as part of the “Chrome >>>>>>>> facilitated testing period” beginning in Q1 2024, as described on >>>>>>>> https://privacysandbox.com/open-web/#the-privacy-sandbox-timeline, >>>>>>>> further phaseout is planned to begin in Q3 2024. (The gradual phaseout >>>>>>>> of >>>>>>>> third-party cookies is subject to addressing any remaining competition >>>>>>>> concerns of the CMA.) >>>>>>>> >>>>>>>> >>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>> >>>>>>>> https://chromestatus.com/feature/5133113939722240 >>>>>>>> >>>>>>>> This intent message was generated by Chrome Platform Status >>>>>>>> <https://chromestatus.com/>. >>>>>>>> >>>>>>> -- >>>>>>>> You received this message because you are subscribed to the Google >>>>>>>> Groups "blink-dev" group. >>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>> send an email to blink-dev+...@chromium.org. >>>>>>>> To view this discussion on the web visit >>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ikogMJZce42o-QcGUMDNiM2Lr_6BGAfP8Gzktakc5_fw%40mail.gmail.com >>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ikogMJZce42o-QcGUMDNiM2Lr_6BGAfP8Gzktakc5_fw%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>> . >>>>>>>> >>>>>>> -- >>>> You received this message because you are subscribed to the Google >>>> Groups "blink-dev" group. >>>> To unsubscribe from this group and stop receiving emails from it, send >>>> an email to blink-dev+...@chromium.org. >>>> To view this discussion on the web visit >>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1d705388-c7ff-46ad-9d4e-db6276b8035an%40chromium.org >>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1d705388-c7ff-46ad-9d4e-db6276b8035an%40chromium.org?utm_medium=email&utm_source=footer> >>>> . >>>> >>>> -- >>> You received this message because you are subscribed to the Google >>> Groups "blink-dev" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to blink-dev+...@chromium.org. >>> >> To view this discussion on the web visit >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ispE4%2Bj-YsxyyxHU%2BGAJ8honiS0feV4zgf_4R_ZJq9MA%40mail.gmail.com >>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ispE4%2Bj-YsxyyxHU%2BGAJ8honiS0feV4zgf_4R_ZJq9MA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>> . >>> >> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4is_2Cqm8mMOnii9XWBb2gHqo9U-TrEAQoTaHu%3Drk7AUg%40mail.gmail.com.