Hi Adam,

Just FYI, we are in the process of setting up a first-party deprecation 
trial (applicable to non-advertising usecases only) as you requested. 
Please see this thread 
<https://groups.google.com/a/chromium.org/g/blink-dev/c/yGUdvW_t_y0/m/DafsVzHFAQAJ>
 
for details.

K

On Thursday, December 7, 2023 at 6:43:27 AM UTC-5 Johann Hofmann wrote:

> Hi Adam,
>
> Thank you for the detailed feedback. I'm discussing with the team and will 
> follow up here.
>
> Thanks,
>
> Johann
>
> On Tue, Dec 5, 2023, 17:17 Adam Gertenbach <agert...@axisgroup.com> wrote:
>
>> Good morning all,
>>
>> Our organization is currently re-reviewing the impacts of the third party 
>> cookie deprecation now that registration for deprecation trials have been 
>> made available. Among our offerings, we provide consulting, hosting, 
>> architecture, and development services for customers in the business 
>> intelligence and enterprise analytics space, including Microsoft Power BI, 
>> Qlik Sense, ThoughtSpot, and Tableau. The ability to provide embedding of 
>> analytics capabilities, such as visualizations and dashboards, is common 
>> across the industry and is supported by each of the major vendors; as such, 
>> we've facilitated these capabilities in architecting and building solutions 
>> for our customers, often using these embedding capabilities to create 
>> custom solutions or enhance enterprise portals that have seen very large 
>> adoption.
>>
>>
>> https://help.qlik.com/en-US/sense-developer/November2023/Content/Sense_Helpsites/embed-qlik-sense.htm
>>
>> https://learn.microsoft.com/en-us/power-bi/collaborate-share/service-embed-secure
>> https://docs.thoughtspot.com/cloud/latest/intro-embed
>> https://help.tableau.com/current/pro/desktop/en-us/embed.htm
>>
>> As one might expect, these embedded solutions are often reliant on a 
>> combination of iframes and cross domain third-party cookies to supply 
>> authentication and authorization and cannot be made to operate under a 
>> single domain. While we intend to actively engage with these vendors to 
>> notify them of expected breakage due to the pending deprecation and would 
>> hope that options for partitioning/CHIPS will make its way into these 
>> products in a timely fashion, there is a significant risk that existing 
>> solutions will be impacted in the interim period; furthermore, the customer 
>> perception around this breakage is likely to impact our reputation based on 
>> our role in delivery, despite the fact that we do not and cannot directly 
>> resolve the underlying cause without third-party participation and product 
>> updates.
>>
>> Historically, resolution of these types of issues have not always been 
>> proactive. Qlik Sense had to update their interfaces as the SameSite None 
>> rollout was occurring due to customer breakage ( 
>> https://community.qlik.com/t5/Official-Support-Articles/Missing-SameSite-attribute-blocks-requests-in-Chrome-80-and/ta-p/1712551
>>  
>> ). More recently, Microsoft's Power BI login process for embedded reports 
>> broke in September when the third-party storage partitioning policies were 
>> enabled due to their use of cross-window localStorage usage for signaling 
>> during authentication. Not knowing that this was in use by their product, 
>> mitigation of this issue involved an all-nighter investigation on our part 
>> to understand what was happening and the enrollment of a first-party 
>> deprecation trial by us to re-enable services for our customers.
>>
>> While I recognize the motivations behind the strategies outlined, the 
>> lack of a first-party deprecation trial to provide wide-spread temporary 
>> mitigation is likely to significantly impair our service offerings and 
>> existing customer solutions while these issues are ironed out and 
>> implemented by these vendors. We're hoping to prepare our customers through 
>> proactive messaging where possible (enterprise policy, anticipated per-user 
>> UI overrides, etc.) but I'd like to call out this scenario and see if 
>> there's anything I'm missing in terms of short-term solutions available to 
>> us, and to ask if a first-party deprecation trial offering is expected for 
>> cases like these where influence on the owners of third-party embeds is 
>> limited.
>>
>> On Tuesday, November 21, 2023 at 7:56:58 PM UTC-5 Rick Byers wrote:
>>
>>> LGTM2 - It's time.
>>>
>>> Given that this is our biggest breaking change ever and I've gotten some 
>>> feedback saying at least a couple people appreciate it when I expand on my 
>>> thought process in compat analysis, I figured I should take the time to try 
>>> to systematically evaluate this against our blink compat principles 
>>> <https://docs.google.com/document/d/1RC-pBBvsazYfCNNUSkPqAVpSpNJ96U8trhNkfV0v9fk/edit#heading=h.83o2xr8ayal6>.
>>>  
>>> Hopefully we'll learn some things from how this deprecation goes in 
>>> practice to help us further improve our framework for evaluating and 
>>> mitigating future compat risk.
>>>
>>>    - *Minimizing end-user impact*
>>>       - *Page views impacted: High risk*
>>>          - The UseCounter 
>>>          
>>> <https://chromestatus.com/metrics/feature/timeline/popularity/3408> 
>>>          has been steady at around 46% for years. Clearly a huge risk from 
>>> our first 
>>>          line of reasoning. 
>>>       - *Unique sites impacted: High risk*
>>>          - I don't have a pointer to data handy, but I assume it's also 
>>>          very large (eg. due to 3p embeds like ads).
>>>       - *Severity of breakage: Moderate risk*
>>>          - One argument is that most sites already need to work for all 
>>>          the Safari and Firefox users and the X% of Chrome users with 3P 
>>> cookies 
>>>          disabled, and so have adapted.
>>>          - But on the other hand we have plenty of examples of sites 
>>>          which just tell users they must enable 3PCs to make the site 
>>> function at 
>>>          all. 
>>>          - So I think we have to say that there are a non-trivial 
>>>          number sites where the severity is total site breakage - 
>>> necessitating all 
>>>          the mitigations, even if most impacted sites have non-visible 
>>> breakage.
>>>       - *Chrome's release process: Moderate mitigation*
>>>          - This change is under very careful finch control with tons of 
>>>          monitoring. 
>>>          - We also have a variety of feedback channels including the 
>>>          manual breakage reporting Johann mentioned, as well as monitoring 
>>> of user 
>>>          behavior to infer breakage, and a pretty big team motivated to 
>>> react 
>>>          quickly to keep user impact to a minimum. 
>>>          - One thing to be mindful of here is that the CMA-mandated 1% 
>>>          experiment will place some limits on the team's options to respond 
>>> to 
>>>          reports of breakage (eg. the deprecation trial says it can't be 
>>> used by 
>>>          sites on the disconnect.me advertising list). 
>>>       - *User opt-out: Very strong mitigation*
>>>          - I've been playing with the cookie control UI (eg. see 
>>>          screenshot below) on my personal account and I'm quite happy with 
>>> it. I've 
>>>          seen the user education directing me to this UI including in 
>>> scenarios like 
>>>          when I reload a page. Some of that may be experiments or things 
>>> undergoing 
>>>          design change (I don't actually know the specific plans, just 
>>> commenting on 
>>>          what I've experienced personally), but it gives me confidence that 
>>> the team 
>>>          is seriously working to educate users on how to opt-out in the 
>>> case of 
>>>          breakage.
>>>          [image: image.png]
>>>       - *Maximizing user experience*
>>>       - *Security & Privacy: Strong mitigation*
>>>          - Personally it seems clear to me (and eg. the W3C TAG 
>>>          <https://www.w3.org/2001/tag/doc/web-without-3p-cookies>) that 
>>>          3PCs being off is the right long-term default for the web in the 
>>> name of 
>>>          privacy.
>>>          - In addition I believe there's some security benefit - eg. 
>>>          making side-channel attacks for sharing data between frames less 
>>> useful to 
>>>          attackers
>>>       - *Performance: Weak mitigation*
>>>          - You could argue that sites will be faster without 3PCs, but 
>>>          I suspect that's temporary.
>>>          - Perhaps more importantly, the deprecation of 3PCs creates 
>>>          pressure to raise the level of abstraction of the web and I think 
>>> history 
>>>          has shown that we can make the web faster the more sites operate 
>>> at a 
>>>          higher level of abstraction (eg. consider scrolling/animation 
>>> being 
>>>          JS-driven vs. browser-driven and the rise of threaded compositing 
>>> with 
>>>          mobile browsers and how web advertising might look 5-10 years from 
>>> now).
>>>       - *User annoyance: Weak mitigation*
>>>          - Maybe a risk of some increase in annoyance - eg. need popups 
>>>          for some things that used to work in-page via iframes. 
>>>          - Certainly having to turn 3PCs back on for a site that 
>>>          doesn't work otherwise will be annoying
>>>          - I'd also argue that, like for performance, raising the level 
>>>          of abstraction will give us more opportunity to reduce annoyance. 
>>> Eg. users 
>>>          will have more centralized and consistent control over their 
>>> advertising 
>>>          preferences.
>>>       - *Minimizing web-developer impact*
>>>       - *Ease of adaptation: Moderate mitigation*
>>>          - Key functional scenarios like identity have well known and 
>>>          long-used alternatives like pop-ups and redirects. Chrome adopting 
>>> the 
>>>          temporary heuristics already used successfully by other browsers 
>>> seems like 
>>>          a significant mitigation for these flows to me.
>>>          - The requestStorageAccess API is a drop-in option in many 
>>>          scenarios (again, already deployed for other browsers)
>>>          - Advertising use cases require a lot more work to adapt to, 
>>>          but massive effort has gone into (and will presumably keep going 
>>> into) 
>>>          building and validating these alternatives.
>>>       - *Developer opt-in / opt-out: Strong mitigation*
>>>          - The deprecation trial seems like a big mitigation to me - 
>>>          pretty easily giving non-ads origins an extra year.  
>>>          - The prior move to require SameSite=None also seems like a 
>>>          significant mitigation, developers have effectively been opting 
>>> into 3PCs 
>>>          in chromium for three years! 
>>>          - There's also been an effort to variety of mechanisms and 
>>>          tools for developers to opt-in to 3PCD and validate their site 
>>> works
>>>       - *Enterprise policy opt-out: Moderate mitigation*
>>>          - Policy control exists. Given the scope of potential impact 
>>>          in enterprises, this still seems like an area of some risk to me 
>>> (eg. BYOD 
>>>          scenarios with Chromium-only custom apps). But again the user 
>>> opt-out is a 
>>>          huge mitigation for this risk.
>>>       - *Debuggability: Moderate mitigation*
>>>          - Purpose-built tools A variety of tools have been built to 
>>>          help developers understand and adapt their cookie usage. Still 
>>> cookies can 
>>>          be complicated, there's no silver bullet.
>>>       - *Outreach: Moderate mitigation*
>>>          - Almost certainly more outreach than we've ever done for a 
>>>          deprecation (even Flash!), yet still not so much as to avoid the 
>>>          likelihood of some developers being surprised. This is a place one 
>>> could 
>>>          always argue for more work, but it's hard to know where the point 
>>> of 
>>>          diminishing returns is, especially prior to the slow roll-out even 
>>>          starting. I expect this is something we'll learn more about during 
>>> the 1% 
>>>          experiment period to guide the ramp-up process after that.
>>>       - *Maximizing web ecosystem benefit*
>>>       - *Interoperability: Strong mitigation*
>>>          - The other two major engines have disabled 3PCs by default 
>>>          for some time. I'm personally uncomfortable with 3PC-related 
>>> breakage being 
>>>          a reason why developers might encourage users to use 
>>> chromium-based 
>>>          browsers. Restoring interoperability across browsers seems like 
>>> strong 
>>>          motivation for accepting some risk here.
>>>          - The team has gone the extra mile to advance specs, write 
>>>          WPTs and generally work to move the web away from UA-specific 
>>> heuristics to 
>>>          a new likely interoperable and standardized state wrt. cookie 
>>> behavior
>>>       - *Standards conformance: Weak mitigation*
>>>          - No standard requires 3PCD, but it seems likely that future 
>>>          web standards will be built under the assumption of 3PCs being 
>>> unavailable 
>>>          (lots of such specs in development on a standards track)
>>>       - *IP rights: Not relevant*
>>>       - *Accepted interop risk: Not relevant*
>>>    
>>> Overall it seems to me like the high risks are appropriately balanced by 
>>> significant mitigations and justifications for accepting the cost of the 
>>> risk. More importantly, every technical tool in our web compat toolbox has 
>>> been brought to bear on mitigating the risks, and significant resources are 
>>> devoted to monitoring and responding to any issues. I both trust the team 
>>> to effectively manage the risk during roll-out and expect that there will 
>>> be some bumps and mistakes that we will want to learn from. 
>>>
>>> Best of luck!
>>>    Rick
>>>
>>> On Wed, Nov 15, 2023 at 5:43 PM Johann Hofmann <joha...@chromium.org> 
>>> wrote:
>>>
>>>> Hi Daniel,
>>>>
>>>> On Wed, Nov 15, 2023 at 6:09 PM Daniel Bratell <brat...@gmail.com> 
>>>> wrote:
>>>>
>>>>> You say Q1 2024, but do you know a more exact date? I ask because we 
>>>>> are entering the holiday freeze period when companies do no changes 
>>>>> whatsoever and even if this makes a site want to fix something, they 
>>>>> might 
>>>>> not be able to until some time into the quarter.
>>>>>
>>>>
>>>> we're currently planning for early Jan, i.e. M120 would be the first 
>>>> release that contains the technical capabilities to ramp to 1% (breakage 
>>>> mitigations, quantitative testing). The holiday freeze is definitely a 
>>>> risk 
>>>> to call out here. However, as mentioned in the intent, we're already 
>>>> operating under the assumption that some sites, despite our outreach 
>>>> efforts, will only find out about this once the deprecation begins. To 
>>>> help 
>>>> with that, we have a number of temporary mitigations available that work 
>>>> quickly and effectively and can be initiated by various stakeholders in 
>>>> this process (site, user, browser). While not directly relevant to the web 
>>>> platform pieces, we plan to have user interface controls to give temporary 
>>>> exceptions per top-level site in Chrome.
>>>>  
>>>>>
>>>>> I also think it might be good to split it into the 1% part, and a 100% 
>>>>> part since it is hard to judge the web compatibility level already and 
>>>>> that 
>>>>> is part of what the 1% run will do.
>>>>>
>>>>
>>>> The 1% is a long-running testing period that we're doing as part of the 
>>>> commitments we entered with the CMA. However, from a readiness / web 
>>>> platform perspective, we'd really like to treat it with the same 
>>>> seriousness and care that we would treat a full rollout, as 1% of users 
>>>> (over a significant amount of time) should not have a greatly degraded 
>>>> user 
>>>> experience. We're trying to ship the full array of breakage mitigations we 
>>>> will have available for potential future rollouts in this phase as well.
>>>>
>>>> So, if possible, I'd prefer to discuss any concerns you might have 
>>>> about web compatibility, mitigations and ecosystem readiness in this 
>>>> thread, rather than pushing it further out. :)
>>>>
>>>> Thanks,
>>>>
>>>> Johann
>>>>  
>>>>
>>>>> /Daniel
>>>>> On 2023-11-13 17:52, David Dabbs wrote:
>>>>>
>>>>> Thanks for the explanation.
>>>>>
>>>>> David
>>>>>
>>>>>
>>>>> On Monday, November 13, 2023 at 9:30:55 AM UTC-6 Johann Hofmann wrote:
>>>>>
>>>>>> Hey David, yeah, that was me trying to fix the entry not showing up 
>>>>>> on API Owner dashboards. I don't think that was what fixed it though, so 
>>>>>> I 
>>>>>> can change it back to "In Developer Trial" (which feels like the most 
>>>>>> accurate right now?) 
>>>>>>
>>>>>> Thanks!
>>>>>>
>>>>>> Johann 
>>>>>>
>>>>>>
>>>>>> On Mon, Nov 13, 2023, 16:10 David Dabbs <david...@epsilon.com> wrote:
>>>>>>
>>>>>>> This morning's Implementation status change to *Deprecated*  
>>>>>>> results in 
>>>>>>>
>>>>>>> Deprecate Third-Party Cookies 
>>>>>>> <https://chromestatus.com/feature/5133113939722240> (Deprecated) 
>>>>>>>
>>>>>>> Did you intend to also rename the feature to "Third-Party Cookies?"
>>>>>>>
>>>>>>>
>>>>>>> Thanks
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Monday, November 13, 2023 at 4:20:47 AM UTC-6 
>>>>>>> yoav...@chromium.org wrote:
>>>>>>>
>>>>>>>> LGTM1 
>>>>>>>>
>>>>>>>> I cannot imagine a more thorough and thoughtful approach than the 
>>>>>>>> one the Privacy Sandbox team has taken to tackle this significant 
>>>>>>>> change to 
>>>>>>>> the web's privacy model while minimizing breakage and providing 
>>>>>>>> replacement 
>>>>>>>> APIs. Thanks for pushing this important work through!!
>>>>>>>>
>>>>>>>> On Mon, Nov 13, 2023 at 10:31 AM Johann Hofmann <
>>>>>>>> joha...@chromium.org> wrote:
>>>>>>>>
>>>>>>>>> Contact emails 
>>>>>>>>>
>>>>>>>>> joha...@chromium.org, wande...@chromium.org, dylan...@chromium.org, 
>>>>>>>>> kaust...@chromium.org, jka...@chromium.org, john...@chromium.org
>>>>>>>>>
>>>>>>>>> Explainer 
>>>>>>>>>
>>>>>>>>> For general information on Privacy Sandbox for the Web and 
>>>>>>>>> Google’s plans to phase out third-party cookies, see 
>>>>>>>>> https://privacysandbox.com/open-web/.
>>>>>>>>>
>>>>>>>>> For additional information on the planned semantics of third-party 
>>>>>>>>> cookie blocking and its interaction with the SameSite cookie 
>>>>>>>>> attribute, see 
>>>>>>>>> https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics
>>>>>>>>>  
>>>>>>>>>
>>>>>>>>> Specification 
>>>>>>>>>
>>>>>>>>> The Cookies RFC contains some language 
>>>>>>>>> <https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-rfc6265bis-12#name-the-cookie-header-field>
>>>>>>>>>  
>>>>>>>>> that, in theory, allows user agents to block third-party cookies, 
>>>>>>>>> leaving a 
>>>>>>>>> lot of details unspecified. We are not happy with this status quo and 
>>>>>>>>> are 
>>>>>>>>> collaborating with other browsers on a significant spec refactoring 
>>>>>>>>> effort 
>>>>>>>>> called cookie layering 
>>>>>>>>> <https://github.com/httpwg/http-extensions/issues/2084> to give 
>>>>>>>>> Fetch/HTML more responsibility over specifying how and when cookies 
>>>>>>>>> are 
>>>>>>>>> stored and attached, as well as a WebAppSec Note based on our 
>>>>>>>>> existing 
>>>>>>>>> explainer 
>>>>>>>>> <https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics>
>>>>>>>>>  
>>>>>>>>> that describes how cookie blocking interacts with SameSite cookies.
>>>>>>>>>
>>>>>>>>> Summary 
>>>>>>>>>
>>>>>>>>> We intend to deprecate and remove default access to third-party 
>>>>>>>>> (aka cross-site) cookies as part of the Privacy Sandbox Timeline 
>>>>>>>>> for the Web 
>>>>>>>>> <https://privacysandbox.com/open-web/#the-privacy-sandbox-timeline>, 
>>>>>>>>> starting with an initial 1% testing period in Q1 2024 
>>>>>>>>> <https://developer.chrome.com/docs/privacy-sandbox/chrome-testing/>, 
>>>>>>>>> followed by a gradual phaseout planned to begin in Q3 2024 after 
>>>>>>>>> consultation 
>>>>>>>>> with the CMA 
>>>>>>>>> <https://www.gov.uk/cma-cases/investigation-into-googles-privacy-sandbox-browser-changes>
>>>>>>>>>  
>>>>>>>>> (The gradual phaseout is subject to addressing any remaining 
>>>>>>>>> competition 
>>>>>>>>> concerns of the UK’s Competition and Markets Authority.)
>>>>>>>>>
>>>>>>>>> Phasing out third-party cookies (3PCs) is a central effort to the 
>>>>>>>>> Privacy Sandbox initiative, which aims to responsibly reduce 
>>>>>>>>> cross-site 
>>>>>>>>> tracking on the web (and beyond) while supporting key use cases 
>>>>>>>>> through new 
>>>>>>>>> technologies. Our phaseout plan was developed with the UK's 
>>>>>>>>> Competition and 
>>>>>>>>> Markets Authority, in line with the commitments 
>>>>>>>>> <https://blog.google/around-the-globe/google-europe/path-forward-privacy-sandbox/>
>>>>>>>>>  
>>>>>>>>> we offered for Privacy Sandbox for the web.
>>>>>>>>>
>>>>>>>>> Blink component 
>>>>>>>>>
>>>>>>>>> Internals>Network>Cookies 
>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ECookies>
>>>>>>>>>
>>>>>>>>> Motivation 
>>>>>>>>>
>>>>>>>>> Our goal on the Privacy Sandbox is to reduce cross-site tracking 
>>>>>>>>> while still enabling the functionality that keeps online content and 
>>>>>>>>> services freely accessible by everyone. Deprecating and removing 
>>>>>>>>> third-party cookies encapsulates the challenge, as they enable 
>>>>>>>>> critical 
>>>>>>>>> functionality across sign-in, fraud protection, advertising, and 
>>>>>>>>> generally 
>>>>>>>>> the ability to embed rich, third-party content in websites—but at the 
>>>>>>>>> same 
>>>>>>>>> time they're also a key enabler of cross-site tracking.
>>>>>>>>>
>>>>>>>>> Initial public proposal 
>>>>>>>>>
>>>>>>>>> N/A
>>>>>>>>>
>>>>>>>>> TAG review 
>>>>>>>>>
>>>>>>>>> The TAG has explicitly endorsed 
>>>>>>>>> <https://w3ctag.github.io/web-without-3p-cookies/#why-restrict-third-party-cookies>
>>>>>>>>>  
>>>>>>>>> (n.b. as a draft document) the deprecation of third-party cookies in 
>>>>>>>>> the 
>>>>>>>>> past. Additionally, we requested feedback on our proposal to 
>>>>>>>>> define the 3PC security semantics 
>>>>>>>>> <https://github.com/w3ctag/design-reviews/issues/904> and 
>>>>>>>>> received generally positive feedback.
>>>>>>>>>
>>>>>>>>> TAG review status 
>>>>>>>>>
>>>>>>>>> Tentatively Positive, see above
>>>>>>>>>
>>>>>>>>> Risks 
>>>>>>>>> Compatibility 
>>>>>>>>>
>>>>>>>>> Impact on the Ads ecosystem:
>>>>>>>>>
>>>>>>>>> A suite of APIs for delivering relevant ads, measuring ad 
>>>>>>>>> performance, and preventing fraud and abuse are now generally 
>>>>>>>>> available in 
>>>>>>>>> Chrome to continue to facilitate ad-supported content on the web. We 
>>>>>>>>> continue to work closely with the UK Competition and Markets 
>>>>>>>>> Authority 
>>>>>>>>> (CMA) on evaluating the impact of this change on the ads ecosystem. 
>>>>>>>>>
>>>>>>>>> Web Compatibility:
>>>>>>>>>
>>>>>>>>> Despite 3PCs already being blocked in Firefox and Safari and 
>>>>>>>>> developer outreach efforts to raise awareness and encourage 
>>>>>>>>> developers to 
>>>>>>>>> prepare for the deprecation, we currently estimate that a non-trivial 
>>>>>>>>> number of sites are still relying on third-party cookies for some 
>>>>>>>>> user-facing functionality. To address this breakage, we have 
>>>>>>>>> developed a 
>>>>>>>>> two-pronged strategy:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>    1. 
>>>>>>>>>    
>>>>>>>>>    Breakage Discovery & Outreach
>>>>>>>>>    
>>>>>>>>> Through various efforts, such as UKM-based signal analysis, scaled 
>>>>>>>>> manual testing and dogfooding, we are collecting a list of impacted 
>>>>>>>>> use 
>>>>>>>>> cases. These individual breakage cases inform our mitigation strategy 
>>>>>>>>> (see 
>>>>>>>>> next step) and future API improvements, as well as our ongoing 
>>>>>>>>> developer 
>>>>>>>>> outreach efforts.
>>>>>>>>>
>>>>>>>>> We also offer developers the ability to report 3PC breakage to the 
>>>>>>>>> Chrome team via goo.gle/report-3pc-broken or ask general 
>>>>>>>>> questions at 
>>>>>>>>> https://github.com/GoogleChromeLabs/privacy-sandbox-dev-support/issues
>>>>>>>>> .
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>    1. 
>>>>>>>>>    
>>>>>>>>>    Temporary Breakage Mitigation
>>>>>>>>>    
>>>>>>>>> It will take time for developers to replace their usage of 3PCs 
>>>>>>>>> with new APIs or different approaches, and some developers may not be 
>>>>>>>>> aware 
>>>>>>>>> of this deprecation until they discover breakage. In order to reduce 
>>>>>>>>> the 
>>>>>>>>> impact of such breakage on the web, we have implemented a series of 
>>>>>>>>> temporary mitigations:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>    - 
>>>>>>>>>    
>>>>>>>>>    Exemption Heuristics 
>>>>>>>>>    
>>>>>>>>> <https://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md>:
>>>>>>>>>  
>>>>>>>>>    We are planning to ship heuristics mirroring those that already 
>>>>>>>>> ship in 
>>>>>>>>>    Firefox and Safari, and are also working with both browsers on a 
>>>>>>>>>    coordinated removal process. Additional details can be found & 
>>>>>>>>> should be 
>>>>>>>>>    discussed in the I2P 
>>>>>>>>>    
>>>>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/Eeh2pE0DRaE/m/1BJyBlCUAAAJ>
>>>>>>>>>  
>>>>>>>>>    & upcoming I2S.
>>>>>>>>>    
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>    - 
>>>>>>>>>    
>>>>>>>>>    Deprecation Trial: 
>>>>>>>>>    
>>>>>>>>> <https://developer.chrome.com/blog/cookie-countdown-2023oct/#request-additional-time-with-the-third-party-deprecation-trial-for-non-advertising-use-cases>
>>>>>>>>>  
>>>>>>>>>    This will be outlined in more detail in the upcoming Request for 
>>>>>>>>>    Deprecation Trial, but it’s important to note that a review step 
>>>>>>>>> including 
>>>>>>>>>    evidence of user-facing breakage will be required for 
>>>>>>>>> participation. 
>>>>>>>>>    Further, we do not intend to approve trials for ads-related use 
>>>>>>>>> cases, to 
>>>>>>>>>    avoid interference with the quantitative testing.
>>>>>>>>>    
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>    - 
>>>>>>>>>    
>>>>>>>>>    As with other launches, we will also have a set of server-side 
>>>>>>>>>    controls to manage the rollout as a whole and minimize issues 
>>>>>>>>> specific 
>>>>>>>>>    sites are causing for users.
>>>>>>>>>    
>>>>>>>>>
>>>>>>>>> Despite all these efforts, we want to be clear that we are 
>>>>>>>>> intentionally taking some risk here in the interest of user privacy.
>>>>>>>>>
>>>>>>>>> Enterprise Compatibility:
>>>>>>>>>
>>>>>>>>> To help with the transition, we intend to allow enterprise 
>>>>>>>>> organizations to opt their applications out of third-party cookie 
>>>>>>>>> blocking 
>>>>>>>>> using the existing BlockThirdPartyCookies 
>>>>>>>>> <https://chromeenterprise.google/policies/#BlockThirdPartyCookies> 
>>>>>>>>> or CookiesAllowedForUrls 
>>>>>>>>> <https://chromeenterprise.google/policies/#CookiesAllowedForUrls> 
>>>>>>>>> policies. Given that enterprise systems are often gated and are 
>>>>>>>>> therefore 
>>>>>>>>> hard to analyze from an external perspective, these policies will 
>>>>>>>>> provide 
>>>>>>>>> additional time for the enterprise ecosystem to adapt. We intend to 
>>>>>>>>> publish 
>>>>>>>>> additional guidance for enterprises on 
>>>>>>>>> https://goo.gle/3pcd-enterprise for the period beyond the 1% 
>>>>>>>>> testing period.
>>>>>>>>>
>>>>>>>>> Interoperability 
>>>>>>>>>
>>>>>>>>> Both Firefox and Safari have removed default access to third-party 
>>>>>>>>> cookies already, though there are small differences 
>>>>>>>>> <https://github.com/DCtheTall/standardizing-cross-site-cookie-semantics>
>>>>>>>>>  
>>>>>>>>> in how browsers treat SameSite=None cookies in so called “ABA” 
>>>>>>>>> scenarios 
>>>>>>>>> (site A embeds site B, which embeds site A again). Chrome ships the 
>>>>>>>>> more 
>>>>>>>>> secure and more restrictive variant, and from initial conversations 
>>>>>>>>> we are 
>>>>>>>>> optimistic that other browsers will adopt it as well. There are also 
>>>>>>>>> subtle 
>>>>>>>>> differences in how browsers restore access to third-party cookies 
>>>>>>>>> through 
>>>>>>>>> mechanisms such as heuristics or custom quirks. Where Chrome 
>>>>>>>>> implements 
>>>>>>>>> similar measures (such as the heuristics 
>>>>>>>>> <https://github.com/amaliev/3pcd-exemption-heuristics/blob/main/explainer.md>),
>>>>>>>>>  
>>>>>>>>> we try to follow the launch and standards processes to achieve as 
>>>>>>>>> much 
>>>>>>>>> interop as we can, given other requirements such as privacy and 
>>>>>>>>> security.
>>>>>>>>>
>>>>>>>>> Gecko: Shipping
>>>>>>>>>
>>>>>>>>> WebKit: Shipping
>>>>>>>>>
>>>>>>>>> Web developers: Mixed Signals
>>>>>>>>>
>>>>>>>>> As one of the most impactful changes to the web platform in a long 
>>>>>>>>> time, the deprecation of 3rd party cookies and the introduction of 
>>>>>>>>> alternative APIs have received a lot of helpful feedback from web 
>>>>>>>>> developers to an extent impossible to summarize in a few sentences. 
>>>>>>>>> As 
>>>>>>>>> described in the summary, the Privacy Sandbox wants to ensure that a 
>>>>>>>>> vibrant, freely accessible web can exist even as we roll out strong 
>>>>>>>>> user 
>>>>>>>>> protections and we will continue to work with web developers to 
>>>>>>>>> understand 
>>>>>>>>> their use cases and ship the right (privacy-preserving) APIs. And 
>>>>>>>>> we’ve 
>>>>>>>>> received feedback 
>>>>>>>>> <https://privacysandbox.com/news/privacy-sandbox-for-the-web-reaches-general-availability/#:~:text=The%20Benefits%20of%20Collaboration>
>>>>>>>>>  
>>>>>>>>> that gives us confidence that we’re on the right track.
>>>>>>>>>
>>>>>>>>> WebView application risks 
>>>>>>>>>
>>>>>>>>> This deprecation will not affect WebView for now.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Debuggability 
>>>>>>>>>
>>>>>>>>> Developers may use the command-line testing switch 
>>>>>>>>> --test-third-party-cookie-phaseout 
>>>>>>>>> (available starting Chrome 115) or enable 
>>>>>>>>> chrome://flags#test-third-party-cookie-phaseout (available 
>>>>>>>>> starting Chrome 117), to simulate browser behavior with default 
>>>>>>>>> access to 
>>>>>>>>> third-party cookies removed. We also started reporting DevTools 
>>>>>>>>> issues for 
>>>>>>>>> cookies impacted by the deprecation starting in Chrome 117 to help 
>>>>>>>>> identify 
>>>>>>>>> potentially impacted workflows. We are continuing to improve our 
>>>>>>>>> developer 
>>>>>>>>> documentation 
>>>>>>>>> <https://developer.chrome.com/blog/cookie-countdown-2023oct/> on 
>>>>>>>>> debugging third-party cookies usage, and guidance on migration to new 
>>>>>>>>> APIs.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Is this feature fully tested by web-platform-tests 
>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>>>> ? 
>>>>>>>>>
>>>>>>>>> Yes. We have put together a set of WPTs 
>>>>>>>>> <https://wpt.fyi/results/cookies/third-party-cookies/third-party-cookies.tentative.https.html?label=experimental&label=master&aligned>
>>>>>>>>>  
>>>>>>>>> which cover third-party cookie blocking for subresource requests. It 
>>>>>>>>> is not 
>>>>>>>>> yet comprehensive, we are working on adding additional tests to 
>>>>>>>>> support our 
>>>>>>>>> standardization efforts.
>>>>>>>>>
>>>>>>>>> Flag name on chrome://flags 
>>>>>>>>>
>>>>>>>>> TestThirdPartyCookiePhaseout
>>>>>>>>>
>>>>>>>>> Finch feature name 
>>>>>>>>>
>>>>>>>>> Due to the nature of the Chrome-facilitated testing period 
>>>>>>>>> <https://developer.chrome.com/docs/privacy-sandbox/chrome-testing/>, 
>>>>>>>>> as well as the general complexity of managing breakage related to 
>>>>>>>>> removing 
>>>>>>>>> third-party cookies, there won’t be a single Finch feature that takes 
>>>>>>>>> us 
>>>>>>>>> from 0% to 100% deprecated. Instead, a collection of features, 
>>>>>>>>> supporting 
>>>>>>>>> different phases and components, will be used.
>>>>>>>>>
>>>>>>>>> Non-finch justification 
>>>>>>>>>
>>>>>>>>> N/A
>>>>>>>>>
>>>>>>>>> Requires code in //chrome? 
>>>>>>>>>
>>>>>>>>> No, the base third-party cookie blocking functionality does not 
>>>>>>>>> require Chrome code. Some custom Chrome functionality (such as the 
>>>>>>>>> aforementioned facilitated testing, mitigations and user experience 
>>>>>>>>> improvements) does require it.
>>>>>>>>>
>>>>>>>>> Estimated milestones 
>>>>>>>>>
>>>>>>>>> Initial phase of Deprecation (1%) is planned as part of the 
>>>>>>>>> “Chrome facilitated testing period” beginning in Q1 2024, as 
>>>>>>>>> described on 
>>>>>>>>> https://privacysandbox.com/open-web/#the-privacy-sandbox-timeline, 
>>>>>>>>> further phaseout is planned to begin in Q3 2024. (The gradual 
>>>>>>>>> phaseout of 
>>>>>>>>> third-party cookies is subject to addressing any remaining 
>>>>>>>>> competition 
>>>>>>>>> concerns of the CMA.)
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Link to entry on the Chrome Platform Status 
>>>>>>>>>
>>>>>>>>> https://chromestatus.com/feature/5133113939722240
>>>>>>>>>
>>>>>>>>> This intent message was generated by Chrome Platform Status 
>>>>>>>>> <https://chromestatus.com/>.
>>>>>>>>>
>>>>>>>> -- 
>>>>>>>>> You received this message because you are subscribed to the Google 
>>>>>>>>> Groups "blink-dev" group.
>>>>>>>>> To unsubscribe from this group and stop receiving emails from it, 
>>>>>>>>> send an email to blink-dev+...@chromium.org.
>>>>>>>>> To view this discussion on the web visit 
>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ikogMJZce42o-QcGUMDNiM2Lr_6BGAfP8Gzktakc5_fw%40mail.gmail.com
>>>>>>>>>  
>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ikogMJZce42o-QcGUMDNiM2Lr_6BGAfP8Gzktakc5_fw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>> .
>>>>>>>>>
>>>>>>>> -- 
>>>>> You received this message because you are subscribed to the Google 
>>>>> Groups "blink-dev" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>>> an email to blink-dev+...@chromium.org.
>>>>> To view this discussion on the web visit 
>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1d705388-c7ff-46ad-9d4e-db6276b8035an%40chromium.org
>>>>>  
>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/1d705388-c7ff-46ad-9d4e-db6276b8035an%40chromium.org?utm_medium=email&utm_source=footer>
>>>>> .
>>>>>
>>>>> -- 
>>>> You received this message because you are subscribed to the Google 
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>> an email to blink-dev+...@chromium.org.
>>>>
>>> To view this discussion on the web visit 
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ispE4%2Bj-YsxyyxHU%2BGAJ8honiS0feV4zgf_4R_ZJq9MA%40mail.gmail.com
>>>>  
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAD_OO4ispE4%2Bj-YsxyyxHU%2BGAJ8honiS0feV4zgf_4R_ZJq9MA%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/12c691ac-4460-4420-92bc-05a7256cefbbn%40chromium.org.

Reply via email to