2.1. What information might this feature expose to Web sites or other parties, and for what purposes is that exposure necessary?
This feature does not, in itself, expose additional information to Web sites or third-parties. This feature allows the shaping of information already exposed to Web sites that self-capture through pre-existing means (such as getDisplayMedia).
2.2. Do features in your specification expose the minimum amount of information necessary to enable their intended uses?
Yes.
2.3. How do the features in your specification deal with personal information, personally-identifiable information (PII), or information derived from them?
Not applicable.
Not applicable.
2.5. Do the features in your specification introduce new state for an origin that persists across browsing sessions?
No.
2.6. Do the features in your specification expose information about the underlying platform to origins?
No.
No.
No.
No.
No.
2.11. Do features in this specification allow an origin some measure of control over a user agent’s native UI?
No. (Other than that the user agent's native UI will inform the user that tab-capture is being used. This feature builds on top of tab-capture; the native UI will have been shown regardless.)
This feature allows a website to mint tokens called RestrictrionTarget
s. These are opaque interfaces which are only meaningful within their browsing context. They do not outlive the browsing session. The party minting the tokens may transfer them to trusted third-parties within the browsing context. The only use these tokens have, is to allow transforming of video tracks through the restriction transformation.
2.13. How does this specification distinguish between behavior in first-party and third-party contexts?
This feature does not distinguish first-party and third-party contexts.
2.14. How do the features in this specification work in the context of a browser’s Private Browsing or Incognito mode?
Not applicable.
2.15. Does this specification have both "Security Considerations" and "Privacy Considerations" sections?
Yes.
No.
This feature only works for documents which use pre-existing mechanisms to self-capture. A non-"fully active" document will have this capture-session interrupted, thereby also terminating the use of this feature.
A Web application that's engaged in self-capture can bypass origin isolation and read pixels from a third-party iframe. This is pre-existing. The main concern raised by the feature introduced by this specification, is that it allows a Web application to observe pixels invisible to the user due to occlussions by other content.
We contend that although this sounds scary at first, it does not actually diminish security and/or privacy, because no new attacks can be launched against the user.
- First, a malicious Web application that managed to trick the user into self-capture, would already be able to obtain access to the same set of pixels before the user had a chance to stop it - load an iframe in the background, then bring it to the forefront; by the time the user mentally registers it, the pixels will have already been recorded by the attacker.
- Second, if a malicious application wishes to read these pixels surreptitiously, this can be done using a combination of any number of techniques. The include:
- Display the content briefly.
- Display the content piecemeal. (As far as one pixel at a time.)
- Display the content at a low opacity.
Further, we contend that for non-malicious applications, this feature is a great boon to user privacy, as it allows responsible applications to pare down the set of pixels to which they gain access. This allows such applications to avoid the accidental recording, or transmission to remote users, of unintended pixels, which could be of a private nature. One example is a video-conferencing into which an iframe is embedded with content to be shared with remote participants; by using our feature, applications can guarantee that private chat messages that overlap the iframe which is intended to be shared, would not be accidentally captured and transmitted to remote participants.