Mike West

@mikewest
648 Followers
109 Following
67 Posts
Chrome's trust and safety team, but my tweets are my own, etc, etc. He/him.
Websitehttps://mikewest.org/

@Ericlaw I think we should reset the sandboxing flags in a window when a user navigates via the address bar.

I’d have to think about what happens when the user navigates via clicking on links on the page, but I agree with you that the outcome is likely confusing.

@zcorpan @Yoav @Wilto RFC6919's "MUST (BUT WE KNOW YOU WON'T)" seems appropriate here.

@slightlyoff @dotproto @developers This change is one we could do without any web-facing changes. I agree that it would be lovely to give developers more granular request options, and `.request()` with a dictionary would be one reasonable approach to that problem.

I'm less convinced that we need to expose the temporary nature of a grant via `.query()`. "Yes, you have access to X right now." is true, but is never guaranteed to remain true (users can revoke permission just as UAs can).

Using `const_cast<...>` with abandon is my favorite part of prototyping.
@Yoav I see you too engage in the time-honored tradition of revamping a blogging engine and/or the architecture it runs on rather than actually writing anything. Don't forget to also look around for new domain names that would be much more inspirational than whatever you're currently using!
@Yoav @scottjehl @chriscoyier We killed it for subresources a few years ago AFAIR. I recall webcams and intranets making it difficult to kill for top level navigations, but I’d be happy if that was no longer the case.

We're making some changes in Chrome to try to prevent bounce tracking on the web. Please help us test and provide feedback! 🙏

https://groups.google.com/a/chromium.org/g/blink-dev/c/vyXWn1W1daA/m/tL3f1_WbAwAJ

Ready for Trial: Bounce Tracking Mitigations

@blinkygal @dbaron @AlesandroOrtiz I think security folks at various vendors can generally agree on things that we'd like to remove from the platform. Shifting from that conversation to agreement on the set of new features that we would tie to deprecations as part of a versioning system is more difficult. We don't have a culture of using additions to the platform as an incentive for change.

David mentioned Secure Context restrictions, which is the only example I can think of in the recent past.

@dbaron @blinkygal @AlesandroOrtiz We had a short conversation around the general topic of versioning in WebAppSec a ~month ago: https://github.com/w3c/webappsec/blob/main/meetings/2023/2023-03-15-minutes.md#linked-on-or-after. TL;DR: general versioning that bundles unrelated changes isn't something folks see as consistent with the web's philosophy.

Something opt-in like https://github.com/mikewest/baseline-header might be a reasonable (though low-reward) start. Ideally, we'll be able to harden `[SecureContext]` a la https://github.com/mikewest/securer-contexts, but that still requires long deprecations.

webappsec/2023-03-15-minutes.md at main · w3c/webappsec

Web Application Security Working Group repo. Contribute to w3c/webappsec development by creating an account on GitHub.

GitHub
Google Is Rolling Out Passkeys, the Password-Killing Tech, to All Accounts

The tech industry’s transition to passkeys gets its first massive boost with the launch of the alternative login scheme for Google’s billions of users.

WIRED