Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Specify revocation of storage access through Clear-Site-Data #127

Closed
johannhof opened this issue Oct 21, 2022 · 5 comments
Closed

Specify revocation of storage access through Clear-Site-Data #127

johannhof opened this issue Oct 21, 2022 · 5 comments
Labels
resolve before graduation These issues need to be resolved before the spec graduates from the CG

Comments

@johannhof
Copy link
Member

We should specify how CSD interacts with SAA. Using Clear-Site-Data: cookies from an embedded context should probably clear storage access permissions as well. It's a bit unclear what happens when the top-level sends that header, but privacycg/storage-partitioning#11 (comment) hints at the fact that we probably don't want to allow the 1P to clear storage access for an embedded 3P either.

Anyway, besides the privacy hygiene aspect, having the ability to reset their own storage access along with clearing cookies could also have some utility for embeddees.

@johannhof johannhof added the resolve before graduation These issues need to be resolved before the spec graduates from the CG label Oct 21, 2022
@annevk
Copy link
Collaborator

annevk commented Oct 21, 2022

I'm somewhat concerned about giving websites the ability to revoke permissions. It seems this could lead to a confusing user experience where the user ends up seeing the same dialog over and over.

@johannhof
Copy link
Member Author

Ah yeah this was discussed in #7 which I forgot to reference here. I didn't really understand your concern there but I think I do now.

So, I can see the ability for buggy sites to cause a bad UX with this and I appreciate you bringing up that concern! I guess I'm somewhat wondering if this is a super cookie or similar privacy risk, where state that is cleared by the site (voluntarily, yes, still) isn't cleared after all because the site still has access to 3P cookies.

I guess there's a similar consideration when we say we don't allow 1Ps to clear 3Ps. I could see a compliance aspect to this where a site may want to make sure that they completely end exposure to any data, both partitioned and non-partitioned and we make that difficult to achieve.

@johannhof
Copy link
Member Author

We discussed this again among editors and the decision is to not do anything here right now, which means that there's no mandate to clear user storage access permissions via CSD.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
resolve before graduation These issues need to be resolved before the spec graduates from the CG
Projects
None yet
Development

No branches or pull requests

3 participants
@annevk @johannhof and others