Does this enable more detection of incognito mode by sites?

On Mon, Jul 14, 2025 at 1:08 PM 'Zainab Rizvi' via blink-dev <
blink-dev@chromium.org> wrote:

> Hi, Alex! This will only be enabled for Chrome's Incognito mode.
>
> On Mon, Jul 14, 2025 at 2:19 PM Alex Russell <slightly...@chromium.org>
> wrote:
>
>> Will this be enabled for all Chromium browsers by default?
>>
>> On Monday, July 14, 2025 at 8:54:57 AM UTC-7 riz...@google.com wrote:
>>
>>> Contact emails
>>>
>>> riz...@google.com, mk...@chromium.org
>>>
>>> Explainer
>>>
>>> https://github.com/explainers-by-googlers/script-blocking
>>>
>>> Specification
>>>
>>> https://github.com/whatwg/fetch/pull/1840
>>>
>>> Summary
>>>
>>> Mitigating API Misuse for Browser Re-Identification, otherwise known as
>>> Script Blocking, is a feature that will block scripts engaging in known,
>>> prevalent techniques for browser re-identification in third-party contexts.
>>> These techniques typically involve the misuse of existing browser APIs to
>>> extract additional information about the user's browser or device
>>> characteristics.
>>>
>>> To strike this balance between protection and usability, this proposal
>>> focuses on blocking scripts in a third-party context in Incognito mode,
>>> enhancing Incognito's protections against cross-site tracking when users
>>> choose to browse in this mode.
>>>
>>> This proposal uses a list-based approach, where only domains marked as
>>> “Impacted by Script Blocking” on the Masked Domain List
>>> <https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md>
>>> (MDL) in a third-party context will be impacted.
>>>
>>> When the feature is enabled, Chrome will check network requests against
>>> the blocklist.  This feature will reuse Chromium's subresource_filter
>>> component, which is responsible for tagging and filtering subresource
>>> requests based on page-level activation signals and a ruleset used to match
>>> URLs for filtering.
>>>
>>> 1% Experiment Summary
>>>
>>> Our 1% stable Incognito experiment did not show any statistically
>>> significant movement for Incognito-specific Core Web Vitals. Furthermore,
>>> we did not receive any breakage reports pertaining to this experiment.
>>>
>>> As the feature is only enabled for third party resources in Incognito
>>> sessions, the sample size is smaller than we typically observe in a 1%
>>> experiment. We plan to carefully ramp the experiment to evaluate
>>> performance and stability impact before launching to Incognito 100%.
>>>
>>> Blink component
>>>
>>> Blink>Network>FetchAPI
>>>
>>> TAG review
>>>
>>> https://github.com/w3ctag/design-reviews/issues/1114
>>>
>>> TAG review status
>>>
>>> Closed (resolution: decline)
>>>
>>>
>>> Risks
>>>
>>> Interoperability and Compatibility
>>>
>>> There shouldn’t be any interop concerns.
>>>
>>> In terms of compatibility, this feature is anticipated to have an impact
>>> on websites that rely on scripts from domains identified as serving
>>> fingerprinting techniques. Sites that integrate third-party scripts from
>>> identified domains may experience functional breakage or render incorrectly
>>> when accessed in Incognito mode. We are attempting to mitigate this risk by
>>> applying temporary exceptions if we determine that the intervention on a
>>> particular domain may cause significant user experience impact.
>>>
>>> Gecko: No signal
>>>
>>> WebKit: Shipped/Shipping Safari has a similar feature as part of
>>> "Intelligent Tracking Prevention" (ITP)
>>>
>>> Firefox: Shipped/Shipping Firefox has a similar feature as part of
>>> "Enhanced Tracking Protection"
>>>
>>> Web developers: <will fill out after explainer publication>
>>>
>>> WebView application risks
>>>
>>> Does this intent deprecate or change behavior of existing APIs, such
>>> that it has potentially high risk for Android WebView-based applications?
>>>
>>> No, we are not proposing to ship this on WebView.
>>>
>>> Debuggability
>>>
>>> We have added support in DevTools Issues to indicate which requests are
>>> being blocked by this feature.
>>>
>>> We also have
>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito which
>>> developers and users can use for testing suspected breakage even before we
>>> ship.
>>>
>>> Will this feature be supported on all six Blink platforms (Windows, Mac,
>>> Linux, ChromeOS, Android, and Android WebView)?
>>>
>>> No. We plan to launch this on all Blink platforms except WebView.
>>>
>>> Is this feature fully tested by web-platform-tests
>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>> ?
>>>
>>> We are exploring ways to test this feature via WPT. This isn’t possible
>>> today given the implementation-defined nature of blocked resources. Some
>>> explorations are discussed here
>>> <https://explainers-by-googlers.github.io/script-blocking/#testing>.
>>>
>>> Flag name on about://flags
>>>
>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito
>>>
>>> Finch feature name
>>>
>>> EnableFingerprintingProtectionInIncognito
>>>
>>> Rollout plan
>>>
>>> (RARE) Experiment users ramp up over time
>>>
>>> Requires code in //chrome?
>>>
>>> False
>>>
>>> Tracking bug
>>>
>>> https://issues.chromium.org/issues/431761692
>>> <https://issues.chromium.org/issues/370696608>
>>>
>>>
>>> Launch bug
>>>
>>> https://launch.corp.google.com/launch/4367306
>>>
>>> Estimated milestones
>>>
>>> Shipping on Desktop
>>>
>>> 140
>>>
>>> Shipping on Android
>>>
>>> 140
>>>
>>> Anticipated spec changes
>>>
>>> Open questions about a feature may be a source of future web compat or
>>> interop issues. Please list open issues (e.g. links to known github issues
>>> in the project for the feature specification) whose resolution may
>>> introduce web compat/interop risk (e.g., changing to naming or structure of
>>> the API in a non-backward-compatible way).
>>>
>>> None
>>>
>>> Link to entry on the Chrome Platform Status
>>>
>>> https://chromestatus.com/feature/5188989497376768
>>>
>>> Links to previous Intent discussions
>>>
>>> Intent to Experiment:
>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/NJvGkSvLk8I?e=48417069
>>>
>>>
>> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKZ%2BBNpOBJQKcFU8QU3N6j9wMvZMwNMQqrLn_RJm_bpchnP3vA%40mail.gmail.com.

Reply via email to