LGTM1; my view is that each browser team is managing risk about 
browser-presented UI and that nothing about this forces anyone to display 
anything.

Best,

Alex

On Thursday, July 10, 2025 at 11:24:51 AM UTC-7 Nina Satragno wrote:

> El mié, 9 jul 2025 a la(s) 12:11 p.m., Stephen Mcgruer (
> smcgr...@chromium.org) escribió:
>
>> > Hey, with regards to providing logos. My understanding is that this 
>> would be displayed in a trusted content. Is there some affordances to 
>> clearly indicate that these logos are provided by the merchants? I'm a 
>> little concerned for cases like displaying arbitrary content in trusted UI 
>> because of things like hate symbols, among other things.
>>
>> Hi Vlad; you're completely right to be concerned in this regard - it is a 
>> general concern with SPC. Whilst we do care about this issue, our 
>> counter-argument is that there is no incentive to display misleading or 
>> offensive logos using SPC.
>>
>> Firstly, if we examine the 'offensive' case - what is the value of SPC 
>> here for someone who wants to offend? If I'm the website, I can render 
>> offensive iconography in an HTML 'bottomsheet' UX, with a Chrome logo at 
>> the top of it, and write whatever I want. Users will generally not know the 
>> difference, and many will just attribute that to being from Chrome anyway. 
>> We're actually not looking to present SPC as being "from Chrome" - there's 
>> no logo, for example. We've historically discussed this with security, and 
>> we have offered to remove the 'line of death/full screen scrim' to further 
>> divorce SPC from being 'browser UX' - but so far they haven't asked us to 
>> do that.
>>
>> Secondly, if we examine the 'misleading' case, we cover that in the spec (
>> here 
>> <https://w3c.github.io/secure-payment-confirmation/#sctn-security-payment-attack>
>>  
>> and here 
>> <https://w3c.github.io/secure-payment-confirmation/#sctn-security-merchant-data>),
>>  
>> but broadly the answer is that even if you trick the user into creating an 
>> SPC cryptogram, it has no value unless you are literally processing a 
>> transaction with the underlying payment providers (and they are able to 
>> examine the output signed cryptogram to know exactly what data you provided 
>> to the user). So as a misleading attacker, you at best end up with an SPC 
>> cryptogram with no use for it.
>>
>> On Wed, 9 Jul 2025 at 12:01, Stephen Mcgruer <smcgr...@chromium.org> 
>> wrote:
>>
>>> > Sorry, I didn't read the WPT PRs you linked. I see that the tests 
>>> already depend on test_driver.add_virtual_authenticator(). Is there 
>>> anything blocking testing here, or is it OK if shipping this is conditional 
>>> on the tests being landed?
>>>
>>> The main issue is that WebAuthn virtual authenticators are not supported 
>>> on Chrome Android (as far as I know, cc @Nina Satragno 
>>> <nsatra...@google.com> ), whilst this feature is shipping first for SPC 
>>> in Chrome Android (with Desktop to follow in a few milestones). So they're 
>>> not going to pass when initially landed (and indeed will regress SPC's 
>>> wpt.fyi status in Chrome), *however* we discussed this internally 
>>> yesterday and decided its still better to have tests that reflect the 
>>> specification even if they now fail due to lack of test support. So our 
>>> plan is to land them in the coming days (once reviewed).
>>>
>>
> This is correct, there's no virtual authenticator support for Android. 
> From a WPT perspective this also seems like a reasonable approach to me.
>  
>
>>
>>> On Wed, 9 Jul 2025 at 11:21, Philip Jägenstedt <foo...@chromium.org> 
>>> wrote:
>>>
>>>> Sorry, I didn't read the WPT PRs you linked. I see that the tests 
>>>> already depend on test_driver.add_virtual_authenticator(). Is there 
>>>> anything blocking testing here, or is it OK if shipping this is 
>>>> conditional 
>>>> on the tests being landed?
>>>>
>>>> On Wed, Jul 9, 2025 at 5:17 PM Philip Jägenstedt <foo...@chromium.org> 
>>>> wrote:
>>>>
>>>>> Hey Stephen,
>>>>>
>>>>> Is WebAuthn virtual authenticators the DevTools feature mentioned in 
>>>>> https://developer.chrome.com/docs/devtools/webauthn?
>>>>>
>>>>> If you need powerful test automation for WebAuthn, have you had a look 
>>>>> at what's currently possible with WebDriver BiDi and testdriver.js? 
>>>>> Recently 
>>>>> <https://github.com/web-platform-tests/wpt/commits/0fc79d8e619d1ab680b2688e8ec6b9dd51b19b26/resources/testdriver.js>
>>>>>  a 
>>>>> lot of previously "too hard" features have been added to testdriver.js, 
>>>>> and 
>>>>> there might be a pattern you can follow there.
>>>>>
>>>>> Best regards,
>>>>> Philip
>>>>>
>>>>> On Thu, Jul 3, 2025 at 7:29 PM Stephen Mcgruer <smcgr...@chromium.org> 
>>>>> wrote:
>>>>>
>>>>>> (Also, -chrome-payments-eng@ as that is an internal group that will 
>>>>>> not accept email from @chromium.org or other external accounts :))
>>>>>>
>>>>>> On Thu, 3 Jul 2025 at 13:26, Stephen Mcgruer <smcgr...@chromium.org> 
>>>>>> wrote:
>>>>>>
>>>>>>> Quick clarification here:
>>>>>>>
>>>>>>> > Is this feature fully tested by web-platform-tests?
>>>>>>> > No
>>>>>>>
>>>>>>> We are working on adding tests, but since the SPC WPTs rely on 
>>>>>>> WebAuthn virtual authenticators, and those are not available on Chrome 
>>>>>>> Android, we are having to test them manually as we develop. When these 
>>>>>>> features are implemented for Desktop then things should start working 
>>>>>>> better!
>>>>>>>
>>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53358 
>>>>>>>    (paymentEntityLogos)
>>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53333 
>>>>>>>    (instrument.details)
>>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53386 (new 
>>>>>>>    output states)
>>>>>>>
>>>>>>>
>>>>>>> On Thu, 3 Jul 2025 at 12:14, Chromestatus <
>>>>>>> ad...@cr-status.appspotmail.com> wrote:
>>>>>>>
>>>>>>>> Contact emails darwiny...@chromium.org, slobo...@chromium.org, 
>>>>>>>> smcgr...@chromium.org 
>>>>>>>>
>>>>>>>> Explainer 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/197 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/275 
>>>>>>>>
>>>>>>>> Specification https://w3c.github.io/secure-payment-confirmation 
>>>>>>>>
>>>>>>>> Design docs 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/197 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/275 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/292 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/294 
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/298 
>>>>>>>>
>>>>>>>> Summary 
>>>>>>>>
>>>>>>>> Updates the UX elements for the SPC dialog on Android Chrome. Other 
>>>>>>>> than just UX presentation the following are being added: - Allowing 
>>>>>>>> merchants to provide an optional list of payment entity logos related 
>>>>>>>> to 
>>>>>>>> the payment that will be displayed in the UX (
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/294). - 
>>>>>>>> Returning different output states back to the merchant depending on 
>>>>>>>> whether 
>>>>>>>> the user wants to continue the transaction without SPC or to cancel 
>>>>>>>> the 
>>>>>>>> transaction (
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/292). 
>>>>>>>> Currently, we only send a single output state back for both cases. - A 
>>>>>>>> new 
>>>>>>>> payment detail label field will be added to the payment instrument so 
>>>>>>>> the 
>>>>>>>> text be presented across 2 lines in SPC (
>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/298)
>>>>>>>>
>>>>>>>>
>>>>>>>> Blink component Blink>Payments 
>>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EPayments%22>
>>>>>>>>  
>>>>>>>>
>>>>>>>> TAG review N/A (minor additive features) 
>>>>>>>>
>>>>>>>> TAG review status Not applicable 
>>>>>>>>
>>>>>>>> Risks 
>>>>>>>>
>>>>>>>>
>>>>>>>> Interoperability and Compatibility 
>>>>>>>>
>>>>>>>> Low risk. The SPC UX Refresh changes are only purely additive API 
>>>>>>>> shapes that are all backwards compatible. The risk is that other 
>>>>>>>> browser do 
>>>>>>>> not implement it.
>>>>>>>>
>>>>>>>>
>>>>>>>> *Gecko*: No signal (
>>>>>>>> https://github.com/mozilla/standards-positions/issues/570) Firefox 
>>>>>>>> has never finalized their view on SPC, so we updated the original SPC 
>>>>>>>> issue 
>>>>>>>> with a note on this additional capability. 
>>>>>>>>
>>>>>>>> *WebKit*: No signal (
>>>>>>>> https://github.com/WebKit/standards-positions/issues/30) Safari 
>>>>>>>> has never finalized their view on SPC, so we updated the original SPC 
>>>>>>>> issue 
>>>>>>>> with a note on this additional capability. 
>>>>>>>>
>>>>>>>> *Web developers*: Positive Responding to requests/feedback from 
>>>>>>>> web developers in the WPWG. 
>>>>>>>>
>>>>>>>> *Other signals*: 
>>>>>>>>
>>>>>>>> WebView application risks 
>>>>>>>>
>>>>>>>> Does this intent deprecate or change behavior of existing APIs, 
>>>>>>>> such that it has potentially high risk for Android WebView-based 
>>>>>>>> applications?
>>>>>>>>
>>>>>>>> None
>>>>>>>>
>>>>>>>>
>>>>>>>> Debuggability 
>>>>>>>>
>>>>>>>> Web developers should be able to try the new SPC UX Refresh through 
>>>>>>>> a Chrome flag, thus no changes are needed in devtools.
>>>>>>>>
>>>>>>>>
>>>>>>>> Will this feature be supported on all six Blink platforms (Windows, 
>>>>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? No 
>>>>>>>>
>>>>>>>> SPC UX Refresh is added to Secure Payment Confirmation which is 
>>>>>>>> supported only on Android, Windows, and Mac.
>>>>>>>>
>>>>>>>>
>>>>>>>> Is this feature fully tested by web-platform-tests 
>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>>> ? No 
>>>>>>>>
>>>>>>>> DevTrial instructions 
>>>>>>>> https://docs.google.com/document/d/1w3RfvmoQqCvJkio4rxl0QR4BL1AzgHdv9a0qJhfCzpg
>>>>>>>>  
>>>>>>>>
>>>>>>>> Flag name on about://flags 
>>>>>>>> enable-secure-payment-confirmation-ux-refresh 
>>>>>>>>
>>>>>>>> Finch feature name SecurePaymentConfirmationUxRefresh 
>>>>>>>>
>>>>>>>> Rollout plan Will ship enabled for all users 
>>>>>>>>
>>>>>>>> Requires code in //chrome? False 
>>>>>>>>
>>>>>>>> Tracking bug https://g-issues.chromium.org/issues/405173922 
>>>>>>>>
>>>>>>>> Launch bug https://launch.corp.google.com/launch/4397413 
>>>>>>>>
>>>>>>>> Measurement SPC UX Refresh is only additive to Secure Payment 
>>>>>>>> Confirmation: The Secure Payment Confirmation UseCounter will be used. 
>>>>>>>>
>>>>>>>> Availability expectation Secure Payment Confirmation is only in 
>>>>>>>> Chromium browsers for the foreseeable future. 
>>>>>>>>
>>>>>>>> Non-OSS dependencies 
>>>>>>>>
>>>>>>>> Does the feature depend on any code or APIs outside the Chromium 
>>>>>>>> open source repository and its open-source dependencies to function?
>>>>>>>> None 
>>>>>>>>
>>>>>>>> Sample links 
>>>>>>>> https://rsolomakhin.github.io/pr/spc-payment-entities-logos 
>>>>>>>> https://rsolomakhin.github.io/pr/spc-opt-out 
>>>>>>>>
>>>>>>>> Estimated milestones 
>>>>>>>> Shipping on Android 139 
>>>>>>>> DevTrial on Android 139 
>>>>>>>>
>>>>>>>> Anticipated spec changes 
>>>>>>>>
>>>>>>>> Open questions about a feature may be a source of future web compat 
>>>>>>>> or interop issues. Please list open issues (e.g. links to known github 
>>>>>>>> issues in the project for the feature specification) whose resolution 
>>>>>>>> may 
>>>>>>>> introduce web compat/interop risk (e.g., changing to naming or 
>>>>>>>> structure of 
>>>>>>>> the API in a non-backward-compatible way).
>>>>>>>> None 
>>>>>>>>
>>>>>>>> Link to entry on the Chrome Platform Status 
>>>>>>>> https://chromestatus.com/feature/5206050462236672?gate=5106969593249792
>>>>>>>>  
>>>>>>>>
>>>>>>>> Links to previous Intent discussions Intent to Prototype: 
>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/683f5e54.170a0220.31427f.1558.GAE%40google.com
>>>>>>>>  
>>>>>>>>
>>>>>>>>
>>>>>>>> This intent message was generated by Chrome Platform Status 
>>>>>>>> <https://chromestatus.com>. 
>>>>>>>>
>>>>>>> -- 
>>>>>> You received this message because you are subscribed to the Google 
>>>>>> Groups "blink-dev" group.
>>>>>> To unsubscribe from this group and stop receiving emails from it, 
>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>> To view this discussion visit 
>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com
>>>>>>  
>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>> .
>>>>>>
>>>>>
>
> -- 
> Nina Satragno
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/bbcefa96-47c5-4ad2-8f38-d735fd94e63an%40chromium.org.

Reply via email to