Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Discussion: High Risk Contexts #6

Open
dmarti opened this issue Feb 20, 2022 · 6 comments
Open

Feature Discussion: High Risk Contexts #6

dmarti opened this issue Feb 20, 2022 · 6 comments

Comments

@dmarti
Copy link

dmarti commented Feb 20, 2022

A related proposal from the Anti-Fraud CG is Anti-Fraud Safelist.

A site would be able to request that a page be treated as a "high-risk context" for purposes of fraud countermeasures.

If a page is a high-risk context, user acfions on that page would not be subject to conversion tracking.

@AramZS
Copy link
Contributor

AramZS commented Apr 7, 2022

Making note here to sync with Anti-Fraud group.

@michaelkleber
Copy link

It seems like there are probably multiple incompatible notions of "high-risk" at play.

For example, consider the page on which a person enters their credit card number and clicks "Purchase". That event surely high-risk on the fraud side, since it involves a financial transaction. But it is surely an event that advertisers would want to consider a conversion, since it involves a financial transaction.

@dmarti
Copy link
Author

dmarti commented Apr 7, 2022

@michaelkleber Some purchase pages would be "high-risk" while others might not. If the user had sufficient time and skills to do conversion reporting manually, would they choose to report the activity?

@bmayd
Copy link

bmayd commented Apr 28, 2022

When working with clients with conversion page constraints similar to those imposed by the high-risk contexts proposal (i.e., no pixels on the conversion page) we would move the pixels to an adjacent context, usually a thank you page. I assume there are various similar means of isolating high-risk contexts that could be employed.

@csharrison
Copy link
Collaborator

My strong preference is that we don't introduce a vague notion of "high risk" into the platform that bleeds out into a bunch of different behaviors across many APIs. Each API should have the proper controls such that pages that identity as "high risk" can configure to get the behavior they desire. This avoids a layer of indirection where everyone needs to remember that "high risk" implies a laundry list of auxiliary behaviors.

It turns out that individual feature controls and configuration is an existing thing on the web platform, called Permissions Policy. In particular, here is one of the motivations:

The developer may want to selectively disable access to certain browser features and APIs to "lock down" their application, as a security or performance precaution, to prevent own and third-party content executing within their application from introducing unwanted or unexpected behaviors within their application.

It sounds like high risk pages could just use Permissions Policy to lock down certain behaviors manually. In fact, the Attribution Reporting API already proposes to use Permissions Policy for this purpose: https://github.com/WICG/conversion-measurement-api/blob/main/EVENT.md#publisher-side-controls-for-attribution-source-declaration

dmarti added a commit to dmarti/conversion-measurement-api that referenced this issue Apr 28, 2022
Publishers will need to check pages for level of user risk before activating. Set the permission policy to default off, so that high risk tracking is less likely to happen  accidentally before this review.

See patcg/private-measurement#6
@dmarti
Copy link
Author

dmarti commented Apr 28, 2022

@csharrison Thank you -- this is helpful. It looks like the permissions policy text in the proposal is most of the way there. See linked pull request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants