Will this be enabled for all Chromium browsers by default?

On Monday, July 14, 2025 at 8:54:57 AM UTC-7 riz...@google.com wrote:

> Contact emails
>
> riz...@google.com, mk...@chromium.org
>
> Explainer
>
> https://github.com/explainers-by-googlers/script-blocking 
>
> Specification
>
> https://github.com/whatwg/fetch/pull/1840
>
> Summary
>
> Mitigating API Misuse for Browser Re-Identification, otherwise known as 
> Script Blocking, is a feature that will block scripts engaging in known, 
> prevalent techniques for browser re-identification in third-party contexts. 
> These techniques typically involve the misuse of existing browser APIs to 
> extract additional information about the user's browser or device 
> characteristics.
>
> To strike this balance between protection and usability, this proposal 
> focuses on blocking scripts in a third-party context in Incognito mode, 
> enhancing Incognito's protections against cross-site tracking when users 
> choose to browse in this mode.
>
> This proposal uses a list-based approach, where only domains marked as 
> “Impacted by Script Blocking” on the Masked Domain List 
> <https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md>
>  
> (MDL) in a third-party context will be impacted.
>
> When the feature is enabled, Chrome will check network requests against 
> the blocklist.  This feature will reuse Chromium's subresource_filter 
> component, which is responsible for tagging and filtering subresource 
> requests based on page-level activation signals and a ruleset used to match 
> URLs for filtering. 
>
> 1% Experiment Summary
>
> Our 1% stable Incognito experiment did not show any statistically 
> significant movement for Incognito-specific Core Web Vitals. Furthermore, 
> we did not receive any breakage reports pertaining to this experiment.
>
> As the feature is only enabled for third party resources in Incognito 
> sessions, the sample size is smaller than we typically observe in a 1% 
> experiment. We plan to carefully ramp the experiment to evaluate 
> performance and stability impact before launching to Incognito 100%.
>
> Blink component
>
> Blink>Network>FetchAPI 
>
> TAG review
>
> https://github.com/w3ctag/design-reviews/issues/1114
>
> TAG review status
>
> Closed (resolution: decline)
>
>
> Risks
>
> Interoperability and Compatibility
>
> There shouldn’t be any interop concerns. 
>
> In terms of compatibility, this feature is anticipated to have an impact 
> on websites that rely on scripts from domains identified as serving 
> fingerprinting techniques. Sites that integrate third-party scripts from 
> identified domains may experience functional breakage or render incorrectly 
> when accessed in Incognito mode. We are attempting to mitigate this risk by 
> applying temporary exceptions if we determine that the intervention on a 
> particular domain may cause significant user experience impact.
>
> Gecko: No signal
>
> WebKit: Shipped/Shipping Safari has a similar feature as part of 
> "Intelligent Tracking Prevention" (ITP)
>
> Firefox: Shipped/Shipping Firefox has a similar feature as part of 
> "Enhanced Tracking Protection" 
>
> Web developers: <will fill out after explainer publication> 
>
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that 
> it has potentially high risk for Android WebView-based applications?
>
> No, we are not proposing to ship this on WebView.
>
> Debuggability
>
> We have added support in DevTools Issues to indicate which requests are 
> being blocked by this feature.
>
> We also have 
> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito which 
> developers and users can use for testing suspected breakage even before we 
> ship.
>
> Will this feature be supported on all six Blink platforms (Windows, Mac, 
> Linux, ChromeOS, Android, and Android WebView)?
>
> No. We plan to launch this on all Blink platforms except WebView.
>
> Is this feature fully tested by web-platform-tests 
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ?
>
> We are exploring ways to test this feature via WPT. This isn’t possible 
> today given the implementation-defined nature of blocked resources. Some 
> explorations are discussed here 
> <https://explainers-by-googlers.github.io/script-blocking/#testing>.
>
> Flag name on about://flags
>
> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito
>
> Finch feature name
>
> EnableFingerprintingProtectionInIncognito
>
> Rollout plan
>
> (RARE) Experiment users ramp up over time
>
> Requires code in //chrome?
>
> False
>
> Tracking bug
>
> https://issues.chromium.org/issues/431761692 
> <https://issues.chromium.org/issues/370696608>
>
>
> Launch bug
>
> https://launch.corp.google.com/launch/4367306 
>
> Estimated milestones
>
> Shipping on Desktop
>
> 140
>
> Shipping on Android
>
> 140
>
> Anticipated spec changes
>
> Open questions about a feature may be a source of future web compat or 
> interop issues. Please list open issues (e.g. links to known github issues 
> in the project for the feature specification) whose resolution may 
> introduce web compat/interop risk (e.g., changing to naming or structure of 
> the API in a non-backward-compatible way).
>
> None
>
> Link to entry on the Chrome Platform Status
>
> https://chromestatus.com/feature/5188989497376768 
>
> Links to previous Intent discussions
>
> Intent to Experiment: 
> https://groups.google.com/a/chromium.org/g/blink-dev/c/NJvGkSvLk8I?e=48417069
>  
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/394036a0-62f9-4bae-b43d-4fad88cf50adn%40chromium.org.

Reply via email to