-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TPAC - Future of Login Status #8
Comments
This seems like a reasonable way forward. I'd prefer not to be an editor :) |
LGTM This matches my interpretation of what we discussed at TPAC. Thanks for writing it down!! |
Hi, and sorry for the delay!
This one is unclear to me. I'm the editor of Login Status API in PrivacyCG and I don't think Sam needs to join there for his work on FedCM. Likewise, I don't think I need to join the FedCM version of this as co-editor. Did Sam want me to?
Do we have to rename it? It seems a bit weird to name an API high trust to imply that some other API is low trust. I think trust should be the default, no? I'm thinking of developers and making sure it's easy for them to get it right. They will not assume that the default is low trust unless they know about the sibling API named high trust. We should make sure developers' assumptions are typically right. So maybe the other API should be renamed? |
I think this is what we agreed on in the meeting but honestly I'm not sure why it would be needed either, so probably fine to skip? In any case it may be useful for you to give some feedback on the API to make sure we're not dramatically of-course from how you'd like the shape of the API to be, to help our long-term interop chances.
Well, I think sequencing it like this makes sense to me because we're working from simple untrusted login status (just call the API for minor benefits in privacy terms, like being able to use FedCM) towards complicated trusted login status (prove that a user signed in with you and get more significant functionality). So, I think both semantically and with regards to implementation complexity for developers and user agents, it makes sense to consider high-trust an "upgrade" to opt into vs. the entry-level low-trust version. |
I think the sequencing indeed makes sense, but you want to make it clear that the low trust API actually caries low trust, I think. Just like we identify unsafe APIs (and don't pretend we know what a safe API is). |
At TPAC, we discussed the future of this repository as well as privacycg/is-logged-in and I believe we reached an agreement that I'd like to record here.
Discussion
Next steps
privacycg/high-trust-login-signals
?) to clarify the current ambiguity.Can I please get a confirmation from @johnwilander @samuelgoto and @bvandersloot-mozilla that this is a good way forward (or possible corrections)?
cc @hlflanagan
The text was updated successfully, but these errors were encountered: