-
Notifications
You must be signed in to change notification settings - Fork 76
Shared Storage #646
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi Mozilla team - it seems we might be a bit early in the process to formally request feedback. I will go ahead and close the ticket for now, but we would love to discuss if you have any thoughts or feedback as we incubate this proposal. Thank you! |
Hi Mozilla team, we have been incubating shared storage in WICG (moved to https://github.com/WICG/shared-storage) and believe we are now ready for your review and feedback, so I'm reopening the request. We continue to be open to changes and would love to hear your thoughts. Thanks! |
We have concluded that Mozilla takes a negative position on this proposal. From a technical perspective, this is not a storage proposal, but a new form of isolated execution environment. This is unlike workers or other execution environments that exist on the web in that it operates on data that the entity providing code has no incentive to keep private; indeed, the opposite is true: they have strong incentive to exfiltrate what they gain access to. We have no evidence to suggest that this might be a viable design. We’ve asked a number of researchers about whether this sort of isolation is technically possible, but are pessimistic about the answer to that question given our own experience and knowledge. We also have reservations about the size and complexity of the design, plus the privacy characteristics of the URL selection design as they relate to k-anonymity and budgeting. We can talk more about some of those, but we’d prefer to see whether the use cases justify the effort. Though this is presented as a general purpose API, the need to severely restrict the flow of information that leaves the isolated realm means that this ends up addressing very specific applications. A few applications were identified for this:
From the perspective of these use cases, we would probably defer a position on this. PATCG is currently discussing attribution, and we are more likely to support the outcome of that process - and oppose any alternative. As noted, reach and frequency are better addressed by other efforts. Finally, we are not yet in a position to speak to the merits of the ad targeting use case. However, even if we did support this from the perspective of these use cases, there are major shortcomings to this approach. This makes us concerned that the design might be inherently incapable of providing the sort of privacy that we wish to ensure for web users. That is, that they retain control over what knowledge of their actions on a site is shared with other sites. |
As we've discussed, until we can be assured that this can be implemented without privacy harms, it is best to oppose this sort of addition to the platform. Closes mozilla#646.
As we've discussed, until we can be assured that this can be implemented without privacy harms, it is best to oppose this sort of addition to the platform. Closes #646.
As we've discussed, until we can be assured that this can be implemented without privacy harms, it is best to oppose this sort of addition to the platform. Closes mozilla#646.
Uh oh!
There was an error while loading. Please reload this page.
Request for Mozilla Position on an Emerging Web Specification
Other information
Note that Chrome is implementing (with spec following shortly after) but we're quite open to evolving the API over time and are appreciative of your feedback. Thank you!
The text was updated successfully, but these errors were encountered: