-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNS TLD for Privacy #36
Comments
I think this needs careful consideration regarding the scope of what you might be requiring these hypothetical sites to commit to. There are obviously some privacy-related things that are technically enforceable and so might engage machinery in browsers. I don't think that that is limited to the use of third-party requests. There are also some privacy-related things that are legally enforceable and so might engage an entirely different sort of machinery in various jurisdictions. And of course this is hardly a clean bifurcation. Some practices bleed across between the two. If your intended scope includes navigation tracking, then that is sometimes identifiable by a browser and sometimes not. What concerns me more is that this specific shape risks ending up as a marketing stunt more than delivering people with meaningful privacy advantages. A gTLD that was specifically "private" ends up positioning itself relative to all the other gTLDs. And this is just one of many dimensions that are relevant when it comes to making decisions about which domains to interact with and how to do so. Google attaching what amount to public hygiene conditions to registrations of Another way of approaching this is to have a site-level commitment to a particular policy, with markers that allow for various types of enforcement, automated or otherwise. GPC has something like that already, which presumably intends to engage with the jurisdictional mechanisms. A browser-level one can effectively be described with CSP ( -- not-chair-comment |
... which is why I noted that Generally I agree that it's better to talk about the specific mechanisms to improve privacy rather then how they're invoked. What's interesting about embedding that mechanism in the name is not only that it's visible, but also that it's immutable -- to change their commitment, a site has to change its name. Of course, there are other ways to make things sticky on the Web. |
:) |
I would be more comfortable with this if there was an equivalent to HSTS (preloading) for the kind of feature you envision. |
An alternative might be to look at the other parts of a hostname, locking in certain properties using a prefixing trick similar to what we've done for cookies. |
Would it make sense to make this as a scheme rather than a TLD? Seems like that would create better backwards compatibility here rather than requiring a separate TLD for this. Additionally, I think the troublesome question here is what features are guaranteed when doing this? E.g. if I go to Overall, I think there's some good ideas to adding a class of website identifiers that are easily recognisable as private, but from the discussions I had with our team we're not sure if this is the best path to approach it. |
+100 for having this functionality, but +100 too for moving the signal to the protocol (or something similar) instead of the TLD That has the benefit of the user knowing the privacy-benefits of the site before they visit it but
|
|
Sure, point taken, but i expect that its easier for folks to understand and follow security advice that is consistent and doesn't have a bunch of decision-tree branches. Right now we tell people "the domain tells you who you're talking to, the protocol tells you [partially] about the privacy/security of that conversation". My point is that Keeping the kind of restriction discussed in this thread to the protocol ( |
I think you're overestimating the protocol's place in users' minds. Browsers have generally aligned on stripping the protocol from the address bar when the user isn't directly interacting with it, relying instead on iconography to represent (negative) security properties.
Hostnames have the nice property of being backwards compatible with browsers. Protocols take some time to gain adoption, have more pervasive impact on core specifications (Fetch, for instance) and fail hard when unsupported. That said, I don't have terribly strong opinions about this. I think the idea of creating a mechanism that allows us to lock in a set of guarantees a priori such that we can reason about them at request time is good. If folks align around protocols, I won't argue about it. :) |
Rumour has it that ICANN is considering another run of the new gTLD program.
Last time around, Google registered
.app
and runs it with an additional semantic: all domains in that TLD are automatically on the HSTS preload list, effectiely enforcing HTTPS for any server with an.app
domain.What if something similar were done with a privacy focus? For sake of argument, let's say
.priv
1 is registered, and there's agreement that browsers will not allow any third-party requests from those domains. The registrar might also insert contractual terms that limited first-party tracking as well.Sites with
.priv
domains could then beliveably market themselves as privacy-focused, giving them an advantage with privacy-concious users / customers.This would also provide an opportunity for browsers to try out new techniques for privacy in a 'sandbox' that's already privacy-focused.
Just thinking out loud here - any interest? Obviously it'd need good browser support. Best path forward might be to define an opt-in signal for sites first, just like HSTS did.
Footnotes
I suspect
.priv
is not the right name here, but let's not bikeshed that at the moment ↩The text was updated successfully, but these errors were encountered: