Hey everyone, thank you for your patience, and thank you to everyone who engaged constructively. It is clear based on the feedback we’ve received that a bigger discussion needs to take place, and I’m not sure my personal repository is the best place to do that - we are looking for a better forum and will update when we have found one. We want to continue the discussion and collaborate to address your core concerns in an improved explainer.

I want to be transparent about the perceived silence from my end. In the W3C process it is common for individuals to put forth early proposals for new web standards, and host them in a team member’s personal repository while pursuing adoption within a standards body. My first impulse was to jump in with more information as soon as possible - but our team wanted to take in all the feedback, and be thorough in our response.

That being said, I did want to take a moment to clarify the problems our team is trying to solve that exist on the web today and point out key details of this early stage proposal that may have been missed.

WEI’s goal is to make the web more private and safe The WEI experiment is part of a larger goal to keep the web safe and open while discouraging cross-site tracking and lessening the reliance on fingerprinting for combating fraud and abuse. Fraud detection and mitigation techniques often rely heavily on analyzing unique client behavior over time for anomalies, which involves large collection of client data from both human users and suspected automated clients.

Privacy features like user-agent reduction, IP reduction, preventing cross-site storage, and fingerprint randomization make it more difficult to distinguish or reidentify individual clients, which is great for privacy, but makes fighting fraud more difficult. This matters to users because making the web more private without providing new APIs to developers could lead to websites adding more:

sign-in gates to access basic content invasive user fingerprinting, which is less transparent to users and more difficult to control excessive challenges (SMS verification, captchas) All of these options are detrimental to a user’s web browsing experience, either by increasing browsing friction or significantly reducing privacy.

We believe this is a tough problem to solve, but a very important one that we will continue to work on. We will continue to design, discuss, and debate in public.

WEI is not designed to single out browsers or extensions Our intention for web environment integrity is to provide browsers with an alternative to the above checks and make it easier for users to block invasive fingerprinting without breaking safety mechanisms. The objective of WEI is to provide a signal that a device can be trusted, not to share data or signals about the browser on the device.

Maintaining users’ access to an open web on all platforms is a critical aspect of the proposal. It is an explicit goal that user agents can browse the web without this proposal, which means we want the user to remain free to modify their browser, install extensions, use Dev tools, and importantly, continue to use accessibility features.

WEI prevents ecosystem lock-in through hold-backs We had proposed a hold-back to prevent lock-in at the platform level. Essentially, some percentage of the time, say 5% or 10%, the WEI attestation would intentionally be omitted, and would look the same as if the user opted-out of WEI or the device is not supported.

This is designed to prevent WEI from becoming “DRM for the web”. Any sites that attempted to restrict browser access based on WEI signals alone would have also restricted access to a significant enough proportion of attestable devices to disincentivize this behavior.

Additionally, and this could be clarified in the explainer more, WEI is an opportunity for developers to use hardware-backed attestation as alternatives to captchas and other privacy-invasive integrity checks.

WEI does not disadvantage browsers that spoof their identity The hold-back and the lack of browser identification in the response provides cover to browsers that spoof their user agents that might otherwise be treated differently by sites. This also includes custom forks of Chromium that web developers create.

Let’s work together on finding the right path We acknowledge facilitating an ecosystem that is open, private, and safe at the same time is a difficult problem, especially when working on the scale and complexity of the web. We welcome collaboration on a solution for scaled anti-abuse that respects user privacy, while maintaining the open nature of the web.

  • lemmyvore@feddit.nl
    link
    fedilink
    arrow-up
    38
    ·
    1 year ago

    We already have sufficient attestation for the web. It’s called SSL/TLS. It guarantees that what the browser sees is what the server put out.

    WEI is about blocking the browser from modifying the website in any way on the client side. Can it be used for good? Sure. Will the company whose income is 90% ads, spies on billions of people, and owns 90% of the browser market share use it for good? Hmm…

    • HaiZhung@feddit.de
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      The explainer explicitly mentions that the proposal allows browser to ignore WEI and the web is intended to work without. It even points out that there will be a continuous group of chrome users of ~5% that have the feature disabled.

      If website owners rely on this feature, they are hurting chrome users just as much as other browsers.

      • lemmyvore@feddit.nl
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        If you view a WEI-enabled site with Chrome you will see ads and there won’t be anything you can do about it. If you view it with a non-WEI browser you won’t see the site at all.

        It creates a fundamental rift in the Web that goes beyond ads. If only one browser can see websites, it proliferates a proprietary Web.

        Keep in mind that Google could achieve the same goal they want (no ad blocking in Chrome) by simply not allowing ad blockers in Chrome. But they’re sneaky cunts and want to spin it as a good thing — instead of the immediate backlash they’d get otherwise.

    • gencha@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      TLS and this proposal are different though. We don’t usually use client certificates with HTTPS. They are proposing something similar though. They want a way to attest the client. There’s really a ton of bot traffic on the web, and these bots are not browsers, and which is the reason we all solve CAPTCHAs. I get the idea, but I’ll support Mozilla’s stance on the subject.

      • lemmyvore@feddit.nl
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        They want a way to attest the client.

        The client’s identity or the client’s state? Because the first can already be done through various means, and the second is an obvious pro-ad move coming from Google.

        Verifying client state is an interesting piece of technology but it doesn’t have a general application. Not every browser and every random person browsing random websites needs it.

        It has applications for specific use cases but that’s not what Google wants.

        • gencha@lemm.ee
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Yeah, I agree. Just wanted to say I get the idea, but Google likely can’t be trusted with implementing a solution.