-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Referrer handling - default policy and capping #538
Comments
Thank you @krgovind for sharing this. Just to re-surface what I mentioned in the original discussion. Brave currently does what @englehardt is suggesting, specifically
Brave does the above and have found it a useful privacy improvement and have not encountered web-compat issues |
@hadleybeeman Pinging to check if this review happened last week. If it helps expedite the review, the Chrome team would like to start by requesting a review of the first part. We are preparing to ship this change in Chrome, and would like to hear the TAG's opinion:
|
Ping TAG. Chrome is planning on shipping this, especially because we have full cross-browser consensus on changing the default referrer policy. There is still discussion on whether or not we should let sites apply a looser policy, but as the editor of the Referrer Policy spec, I don't think that should block this. |
Hi @domfarolino - thanks for heads up - we haven't had t a chance to really put this on the table for TAG discussion yet unfortunately. I'm going to put it on our agenda for w/o 14th Sept - I hope we can still provide useful feedback at that point. |
We've discussed today in the TAG breakout - That sounds good to us ("align[ing] on defaulting to strict-origin-when-cross-origin"). We think more restrictions ("permanently trim cross-site referrers") – aligned across browsers – would be good as well. It looks like more work needs to be done to explore where this would potentially break existing content - especially in the long tail. |
This slipped off our radar to actually close the issue although we had agreed to close it so we are closing it now. ✨ |
Saluton TAG!
I'm requesting a TAG review of current and proposed handling of referrers across various browsers, as being discussed on privacycg/proposals#13.
As summarized by @englehardt on the PrivacyCG thread, referrers leak users' browsing activity cross-site. Browsers have either already shipped, or are experimenting with a combination of:
strict-origin-when-cross-origin
- spec update in Make strict-origin-when-cross-origin the default referrer policy w3c/webappsec-referrer-policy#142strict-origin-when-cross-origin
or eTLD+1 (Firefox and Safari selectively apply capping to classified/tracker domains).Does the TAG have an opinion on the present disparity among browsers, and appropriate long term handling of referrers?
As @englehardt asks:
CC: @domfarolino @johnwilander @erik-anderson @pes10k
The text was updated successfully, but these errors were encountered: