Hi Chris! We will have a few UI indicators when a resource is blocked: 1. The "eye" icon will show up in the Omnibox that will allow users to disable the feature on a particular top-level site. 2. There is a toggle in settings for users to disable the feature entirely. 3. For developers, a dedicated issue will pop up in the "Issues" tab. 4. For developers, there is a dedicated network error <https://source.chromium.org/chromium/chromium/src/+/main:net/base/net_error_list.h;l=136?q=BLOCKED_BY_FINGER&sq=&ss=chromium> in the "Network" tab.
On Wed, Jul 16, 2025 at 11:32 AM Chris Harrelson <chris...@chromium.org> wrote: > In case of something breaking: When a script is blocked, is the user able > to find that out in a site settings dialog? > > On Tue, Jul 15, 2025 at 7:59 AM 'Zainab Rizvi' via blink-dev < > blink-dev@chromium.org> wrote: > >> Yes, though Script Blocking in Incognito would have the same observable >> effect as extensions that block resources, such as ad blockers. The team is >> also adding monitoring to see if incognito detectability is on the rise due >> to these features. >> >> On Mon, Jul 14, 2025 at 7:23 PM Gregg Tavares <g...@chromium.org> wrote: >> >>> Does this enable more detection of incognito mode by sites? >>> >>> On Mon, Jul 14, 2025 at 1:08 PM 'Zainab Rizvi' via blink-dev < >>> blink-dev@chromium.org> wrote: >>> >>>> Hi, Alex! This will only be enabled for Chrome's Incognito mode. >>>> >>>> On Mon, Jul 14, 2025 at 2:19 PM Alex Russell <slightly...@chromium.org> >>>> wrote: >>>> >>>>> Will this be enabled for all Chromium browsers by default? >>>>> >>>>> On Monday, July 14, 2025 at 8:54:57 AM UTC-7 riz...@google.com wrote: >>>>> >>>>>> Contact emails >>>>>> >>>>>> riz...@google.com, mk...@chromium.org >>>>>> >>>>>> Explainer >>>>>> >>>>>> https://github.com/explainers-by-googlers/script-blocking >>>>>> >>>>>> Specification >>>>>> >>>>>> https://github.com/whatwg/fetch/pull/1840 >>>>>> >>>>>> Summary >>>>>> >>>>>> Mitigating API Misuse for Browser Re-Identification, otherwise known >>>>>> as Script Blocking, is a feature that will block scripts engaging in >>>>>> known, >>>>>> prevalent techniques for browser re-identification in third-party >>>>>> contexts. >>>>>> These techniques typically involve the misuse of existing browser APIs to >>>>>> extract additional information about the user's browser or device >>>>>> characteristics. >>>>>> >>>>>> To strike this balance between protection and usability, this >>>>>> proposal focuses on blocking scripts in a third-party context in >>>>>> Incognito >>>>>> mode, enhancing Incognito's protections against cross-site tracking when >>>>>> users choose to browse in this mode. >>>>>> >>>>>> This proposal uses a list-based approach, where only domains marked >>>>>> as “Impacted by Script Blocking” on the Masked Domain List >>>>>> <https://github.com/GoogleChrome/ip-protection/blob/main/Masked-Domain-List.md> >>>>>> (MDL) in a third-party context will be impacted. >>>>>> >>>>>> When the feature is enabled, Chrome will check network requests >>>>>> against the blocklist. This feature will reuse Chromium's >>>>>> subresource_filter component, which is responsible for tagging and >>>>>> filtering subresource requests based on page-level activation signals >>>>>> and a >>>>>> ruleset used to match URLs for filtering. >>>>>> >>>>>> 1% Experiment Summary >>>>>> >>>>>> Our 1% stable Incognito experiment did not show any statistically >>>>>> significant movement for Incognito-specific Core Web Vitals. Furthermore, >>>>>> we did not receive any breakage reports pertaining to this experiment. >>>>>> >>>>>> As the feature is only enabled for third party resources in Incognito >>>>>> sessions, the sample size is smaller than we typically observe in a 1% >>>>>> experiment. We plan to carefully ramp the experiment to evaluate >>>>>> performance and stability impact before launching to Incognito 100%. >>>>>> >>>>>> Blink component >>>>>> >>>>>> Blink>Network>FetchAPI >>>>>> >>>>>> TAG review >>>>>> >>>>>> https://github.com/w3ctag/design-reviews/issues/1114 >>>>>> >>>>>> TAG review status >>>>>> >>>>>> Closed (resolution: decline) >>>>>> >>>>>> >>>>>> Risks >>>>>> >>>>>> Interoperability and Compatibility >>>>>> >>>>>> There shouldn’t be any interop concerns. >>>>>> >>>>>> In terms of compatibility, this feature is anticipated to have an >>>>>> impact on websites that rely on scripts from domains identified as >>>>>> serving >>>>>> fingerprinting techniques. Sites that integrate third-party scripts from >>>>>> identified domains may experience functional breakage or render >>>>>> incorrectly >>>>>> when accessed in Incognito mode. We are attempting to mitigate this risk >>>>>> by >>>>>> applying temporary exceptions if we determine that the intervention on a >>>>>> particular domain may cause significant user experience impact. >>>>>> >>>>>> Gecko: No signal >>>>>> >>>>>> WebKit: Shipped/Shipping Safari has a similar feature as part of >>>>>> "Intelligent Tracking Prevention" (ITP) >>>>>> >>>>>> Firefox: Shipped/Shipping Firefox has a similar feature as part of >>>>>> "Enhanced Tracking Protection" >>>>>> >>>>>> Web developers: <will fill out after explainer publication> >>>>>> >>>>>> WebView application risks >>>>>> >>>>>> Does this intent deprecate or change behavior of existing APIs, such >>>>>> that it has potentially high risk for Android WebView-based applications? >>>>>> >>>>>> No, we are not proposing to ship this on WebView. >>>>>> >>>>>> Debuggability >>>>>> >>>>>> We have added support in DevTools Issues to indicate which requests >>>>>> are being blocked by this feature. >>>>>> >>>>>> We also have >>>>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito >>>>>> which >>>>>> developers and users can use for testing suspected breakage even before >>>>>> we >>>>>> ship. >>>>>> >>>>>> Will this feature be supported on all six Blink platforms (Windows, >>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? >>>>>> >>>>>> No. We plan to launch this on all Blink platforms except WebView. >>>>>> >>>>>> Is this feature fully tested by web-platform-tests >>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>> ? >>>>>> >>>>>> We are exploring ways to test this feature via WPT. This isn’t >>>>>> possible today given the implementation-defined nature of blocked >>>>>> resources. Some explorations are discussed here >>>>>> <https://explainers-by-googlers.github.io/script-blocking/#testing>. >>>>>> >>>>>> Flag name on about://flags >>>>>> >>>>>> chrome://flags/#enable-fingerprinting-protection-blocklist-incognito >>>>>> >>>>>> Finch feature name >>>>>> >>>>>> EnableFingerprintingProtectionInIncognito >>>>>> >>>>>> Rollout plan >>>>>> >>>>>> (RARE) Experiment users ramp up over time >>>>>> >>>>>> Requires code in //chrome? >>>>>> >>>>>> False >>>>>> >>>>>> Tracking bug >>>>>> >>>>>> https://issues.chromium.org/issues/431761692 >>>>>> <https://issues.chromium.org/issues/370696608> >>>>>> >>>>>> >>>>>> Launch bug >>>>>> >>>>>> https://launch.corp.google.com/launch/4367306 >>>>>> >>>>>> Estimated milestones >>>>>> >>>>>> Shipping on Desktop >>>>>> >>>>>> 140 >>>>>> >>>>>> Shipping on Android >>>>>> >>>>>> 140 >>>>>> >>>>>> Anticipated spec changes >>>>>> >>>>>> Open questions about a feature may be a source of future web compat >>>>>> or interop issues. Please list open issues (e.g. links to known github >>>>>> issues in the project for the feature specification) whose resolution may >>>>>> introduce web compat/interop risk (e.g., changing to naming or structure >>>>>> of >>>>>> the API in a non-backward-compatible way). >>>>>> >>>>>> None >>>>>> >>>>>> Link to entry on the Chrome Platform Status >>>>>> >>>>>> https://chromestatus.com/feature/5188989497376768 >>>>>> >>>>>> Links to previous Intent discussions >>>>>> >>>>>> Intent to Experiment: >>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/NJvGkSvLk8I?e=48417069 >>>>>> >>>>>> >>>>> -- >>>> You received this message because you are subscribed to the Google >>>> Groups "blink-dev" group. >>>> To unsubscribe from this group and stop receiving emails from it, send >>>> an email to blink-dev+unsubscr...@chromium.org. >>>> To view this discussion visit >>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com >>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjkJMw5aXR6T%3DQiiajtqAC0s9uqaWEZYgM6J4hUj5W7fA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>> . >>>> >>> -- >> You received this message because you are subscribed to the Google Groups >> "blink-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to blink-dev+unsubscr...@chromium.org. >> To view this discussion visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjGDTA_6ONhuHAxhg7yi-n9kC2y9JdL5nXtUzjb3FXd2Q%40mail.gmail.com >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsjGDTA_6ONhuHAxhg7yi-n9kC2y9JdL5nXtUzjb3FXd2Q%40mail.gmail.com?utm_medium=email&utm_source=footer> >> . >> > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFhOYsieQ5z%3DKQEOQ_ELRSXHW1-agGASiD0aaVpkCku_BR%2BL%2Bg%40mail.gmail.com.