-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
3rd-party access to client-hints causes payload bloat and confusion #152
Comments
Looking through the permissions-policy issues list, I think this may already be covered by w3c/webappsec-permissions-policy#408 |
It would be interesting to see some data on this. Do you have any examples with measurements @Steve51D? |
There's also WICG/client-hints-infrastructure#23 My complaint there stems from how awkward this is to explain to people. I've settled on: "Accept-CH asks the browser to send particular hints. Permissions-Policy asks the browser to send particular hints to particular origins. It seems a bit duplicative because it is: you need to do both." |
Currently, 3rd parties will only be sent client hints if both:
For major websites with a large web of 3rd party dependencies, this ends up being incredibly verbose and can significantly inflate the size of the response.
Is there any reason that a more succinct solution, even a re-use of existing headers such as content-security-policy, is not viable?
For example, if I've given permissions for JavaScript from www.example.com to run on my page using csp, why should I then need to separately allow access to client hints for that 3rd party?
The text was updated successfully, but these errors were encountered: