El mié, 9 jul 2025 a la(s) 12:11 p.m., Stephen Mcgruer (
smcgr...@chromium.org) escribió:

> > Hey, with regards to providing logos. My understanding is that this
> would be displayed in a trusted content. Is there some affordances to
> clearly indicate that these logos are provided by the merchants? I'm a
> little concerned for cases like displaying arbitrary content in trusted UI
> because of things like hate symbols, among other things.
>
> Hi Vlad; you're completely right to be concerned in this regard - it is a
> general concern with SPC. Whilst we do care about this issue, our
> counter-argument is that there is no incentive to display misleading or
> offensive logos using SPC.
>
> Firstly, if we examine the 'offensive' case - what is the value of SPC
> here for someone who wants to offend? If I'm the website, I can render
> offensive iconography in an HTML 'bottomsheet' UX, with a Chrome logo at
> the top of it, and write whatever I want. Users will generally not know the
> difference, and many will just attribute that to being from Chrome anyway.
> We're actually not looking to present SPC as being "from Chrome" - there's
> no logo, for example. We've historically discussed this with security, and
> we have offered to remove the 'line of death/full screen scrim' to further
> divorce SPC from being 'browser UX' - but so far they haven't asked us to
> do that.
>
> Secondly, if we examine the 'misleading' case, we cover that in the spec (
> here
> <https://w3c.github.io/secure-payment-confirmation/#sctn-security-payment-attack>
> and here
> <https://w3c.github.io/secure-payment-confirmation/#sctn-security-merchant-data>),
> but broadly the answer is that even if you trick the user into creating an
> SPC cryptogram, it has no value unless you are literally processing a
> transaction with the underlying payment providers (and they are able to
> examine the output signed cryptogram to know exactly what data you provided
> to the user). So as a misleading attacker, you at best end up with an SPC
> cryptogram with no use for it.
>
> On Wed, 9 Jul 2025 at 12:01, Stephen Mcgruer <smcgr...@chromium.org>
> wrote:
>
>> > Sorry, I didn't read the WPT PRs you linked. I see that the tests
>> already depend on test_driver.add_virtual_authenticator(). Is there
>> anything blocking testing here, or is it OK if shipping this is conditional
>> on the tests being landed?
>>
>> The main issue is that WebAuthn virtual authenticators are not supported
>> on Chrome Android (as far as I know, cc @Nina Satragno
>> <nsatra...@google.com> ), whilst this feature is shipping first for SPC
>> in Chrome Android (with Desktop to follow in a few milestones). So they're
>> not going to pass when initially landed (and indeed will regress SPC's
>> wpt.fyi status in Chrome), *however* we discussed this internally
>> yesterday and decided its still better to have tests that reflect the
>> specification even if they now fail due to lack of test support. So our
>> plan is to land them in the coming days (once reviewed).
>>
>
This is correct, there's no virtual authenticator support for Android. From
a WPT perspective this also seems like a reasonable approach to me.


>
>> On Wed, 9 Jul 2025 at 11:21, Philip Jägenstedt <foo...@chromium.org>
>> wrote:
>>
>>> Sorry, I didn't read the WPT PRs you linked. I see that the tests
>>> already depend on test_driver.add_virtual_authenticator(). Is there
>>> anything blocking testing here, or is it OK if shipping this is conditional
>>> on the tests being landed?
>>>
>>> On Wed, Jul 9, 2025 at 5:17 PM Philip Jägenstedt <foo...@chromium.org>
>>> wrote:
>>>
>>>> Hey Stephen,
>>>>
>>>> Is WebAuthn virtual authenticators the DevTools feature mentioned in
>>>> https://developer.chrome.com/docs/devtools/webauthn?
>>>>
>>>> If you need powerful test automation for WebAuthn, have you had a look
>>>> at what's currently possible with WebDriver BiDi and testdriver.js?
>>>> Recently
>>>> <https://github.com/web-platform-tests/wpt/commits/0fc79d8e619d1ab680b2688e8ec6b9dd51b19b26/resources/testdriver.js>
>>>>  a
>>>> lot of previously "too hard" features have been added to testdriver.js, and
>>>> there might be a pattern you can follow there.
>>>>
>>>> Best regards,
>>>> Philip
>>>>
>>>> On Thu, Jul 3, 2025 at 7:29 PM Stephen Mcgruer <smcgr...@chromium.org>
>>>> wrote:
>>>>
>>>>> (Also, -chrome-payments-eng@ as that is an internal group that will
>>>>> not accept email from @chromium.org or other external accounts :))
>>>>>
>>>>> On Thu, 3 Jul 2025 at 13:26, Stephen Mcgruer <smcgr...@chromium.org>
>>>>> wrote:
>>>>>
>>>>>> Quick clarification here:
>>>>>>
>>>>>> > Is this feature fully tested by web-platform-tests?
>>>>>> > No
>>>>>>
>>>>>> We are working on adding tests, but since the SPC WPTs rely on
>>>>>> WebAuthn virtual authenticators, and those are not available on Chrome
>>>>>> Android, we are having to test them manually as we develop. When these
>>>>>> features are implemented for Desktop then things should start working
>>>>>> better!
>>>>>>
>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53358
>>>>>>    (paymentEntityLogos)
>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53333
>>>>>>    (instrument.details)
>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53386 (new
>>>>>>    output states)
>>>>>>
>>>>>>
>>>>>> On Thu, 3 Jul 2025 at 12:14, Chromestatus <
>>>>>> ad...@cr-status.appspotmail.com> wrote:
>>>>>>
>>>>>>> Contact emails darwiny...@chromium.org, slobo...@chromium.org,
>>>>>>> smcgr...@chromium.org
>>>>>>>
>>>>>>> Explainer
>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/197
>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/275
>>>>>>>
>>>>>>> Specification https://w3c.github.io/secure-payment-confirmation
>>>>>>>
>>>>>>> Design docs
>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/197
>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/275
>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/292
>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/294
>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/298
>>>>>>>
>>>>>>> Summary
>>>>>>>
>>>>>>> Updates the UX elements for the SPC dialog on Android Chrome. Other
>>>>>>> than just UX presentation the following are being added: - Allowing
>>>>>>> merchants to provide an optional list of payment entity logos related to
>>>>>>> the payment that will be displayed in the UX (
>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/294). -
>>>>>>> Returning different output states back to the merchant depending on 
>>>>>>> whether
>>>>>>> the user wants to continue the transaction without SPC or to cancel the
>>>>>>> transaction (
>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/292).
>>>>>>> Currently, we only send a single output state back for both cases. - A 
>>>>>>> new
>>>>>>> payment detail label field will be added to the payment instrument so 
>>>>>>> the
>>>>>>> text be presented across 2 lines in SPC (
>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/298)
>>>>>>>
>>>>>>>
>>>>>>> Blink component Blink>Payments
>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EPayments%22>
>>>>>>>
>>>>>>> TAG review N/A (minor additive features)
>>>>>>>
>>>>>>> TAG review status Not applicable
>>>>>>>
>>>>>>> Risks
>>>>>>>
>>>>>>>
>>>>>>> Interoperability and Compatibility
>>>>>>>
>>>>>>> Low risk. The SPC UX Refresh changes are only purely additive API
>>>>>>> shapes that are all backwards compatible. The risk is that other 
>>>>>>> browser do
>>>>>>> not implement it.
>>>>>>>
>>>>>>>
>>>>>>> *Gecko*: No signal (
>>>>>>> https://github.com/mozilla/standards-positions/issues/570) Firefox
>>>>>>> has never finalized their view on SPC, so we updated the original SPC 
>>>>>>> issue
>>>>>>> with a note on this additional capability.
>>>>>>>
>>>>>>> *WebKit*: No signal (
>>>>>>> https://github.com/WebKit/standards-positions/issues/30) Safari has
>>>>>>> never finalized their view on SPC, so we updated the original SPC issue
>>>>>>> with a note on this additional capability.
>>>>>>>
>>>>>>> *Web developers*: Positive Responding to requests/feedback from web
>>>>>>> developers in the WPWG.
>>>>>>>
>>>>>>> *Other signals*:
>>>>>>>
>>>>>>> WebView application risks
>>>>>>>
>>>>>>> Does this intent deprecate or change behavior of existing APIs, such
>>>>>>> that it has potentially high risk for Android WebView-based 
>>>>>>> applications?
>>>>>>>
>>>>>>> None
>>>>>>>
>>>>>>>
>>>>>>> Debuggability
>>>>>>>
>>>>>>> Web developers should be able to try the new SPC UX Refresh through
>>>>>>> a Chrome flag, thus no changes are needed in devtools.
>>>>>>>
>>>>>>>
>>>>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? No
>>>>>>>
>>>>>>> SPC UX Refresh is added to Secure Payment Confirmation which is
>>>>>>> supported only on Android, Windows, and Mac.
>>>>>>>
>>>>>>>
>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>> ? No
>>>>>>>
>>>>>>> DevTrial instructions
>>>>>>> https://docs.google.com/document/d/1w3RfvmoQqCvJkio4rxl0QR4BL1AzgHdv9a0qJhfCzpg
>>>>>>>
>>>>>>> Flag name on about://flags
>>>>>>> enable-secure-payment-confirmation-ux-refresh
>>>>>>>
>>>>>>> Finch feature name SecurePaymentConfirmationUxRefresh
>>>>>>>
>>>>>>> Rollout plan Will ship enabled for all users
>>>>>>>
>>>>>>> Requires code in //chrome? False
>>>>>>>
>>>>>>> Tracking bug https://g-issues.chromium.org/issues/405173922
>>>>>>>
>>>>>>> Launch bug https://launch.corp.google.com/launch/4397413
>>>>>>>
>>>>>>> Measurement SPC UX Refresh is only additive to Secure Payment
>>>>>>> Confirmation: The Secure Payment Confirmation UseCounter will be used.
>>>>>>>
>>>>>>> Availability expectation Secure Payment Confirmation is only in
>>>>>>> Chromium browsers for the foreseeable future.
>>>>>>>
>>>>>>> Non-OSS dependencies
>>>>>>>
>>>>>>> Does the feature depend on any code or APIs outside the Chromium
>>>>>>> open source repository and its open-source dependencies to function?
>>>>>>> None
>>>>>>>
>>>>>>> Sample links
>>>>>>> https://rsolomakhin.github.io/pr/spc-payment-entities-logos
>>>>>>> https://rsolomakhin.github.io/pr/spc-opt-out
>>>>>>>
>>>>>>> Estimated milestones
>>>>>>> Shipping on Android 139
>>>>>>> DevTrial on Android 139
>>>>>>>
>>>>>>> Anticipated spec changes
>>>>>>>
>>>>>>> Open questions about a feature may be a source of future web compat
>>>>>>> or interop issues. Please list open issues (e.g. links to known github
>>>>>>> issues in the project for the feature specification) whose resolution 
>>>>>>> may
>>>>>>> introduce web compat/interop risk (e.g., changing to naming or 
>>>>>>> structure of
>>>>>>> the API in a non-backward-compatible way).
>>>>>>> None
>>>>>>>
>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>> https://chromestatus.com/feature/5206050462236672?gate=5106969593249792
>>>>>>>
>>>>>>> Links to previous Intent discussions Intent to Prototype:
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/683f5e54.170a0220.31427f.1558.GAE%40google.com
>>>>>>>
>>>>>>>
>>>>>>> This intent message was generated by Chrome Platform Status
>>>>>>> <https://chromestatus.com>.
>>>>>>>
>>>>>> --
>>>>> You received this message because you are subscribed to the Google
>>>>> Groups "blink-dev" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>>> To view this discussion visit
>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com
>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>> .
>>>>>
>>>>

-- 
Nina Satragno

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGisG_hhg7ag_0hMzo5q%3DCg1AK-L43s1XrztKKUPEREFL1cWMQ%40mail.gmail.com.

Reply via email to