Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Privacy and security changes #2297

Merged
merged 8 commits into from
Jun 7, 2022
13 changes: 7 additions & 6 deletions epub33/a11y/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -1640,7 +1640,7 @@ <h2>Distribution</h2>
accessibility by activating a feature that would normally not be active.</p>
</div>
</section>
<section id="privacy" class="informative">
<section id="privacy">
<h2>Privacy and security</h2>

<p>The authoring of accessible content does not introduce any new privacy or security considerations for
Expand All @@ -1660,12 +1660,12 @@ <h2>Privacy and security</h2>
obtained from the user and a means of easily removing the profile is available.</p>

<p>Even in the case where a user assents to the application maintaining information about their
accessibility needs, developers must ensure that this information is kept private (e.g., it must not be
shared with third party advertisers or even with the original publisher).</p>
accessibility needs, developers SHOULD ensure that this information is kept private (e.g., not share the
information with third party advertisers or even with the original publisher).</p>

<p>Developers should also be mindful about storing or mining information about the types of searches a user
performs when searching for content based on its accessibility characteristics. This information can be
used to indirectly profile the abilities of users.</p>
<p>Developers SHOULD NOT store or mine information about the types of searches a user performs when
searching for content based on its accessibility characteristics. This information can be used to
indirectly profile the abilities of users.</p>
</section>
<section id="app-a11y-vocab" class="appendix vocab">
<h2>EPUB accessibility vocabulary</h2>
Expand Down Expand Up @@ -1853,6 +1853,7 @@ <h2>Change log</h2>
>working group's issue tracker</a>.</p>

<ul>
<li>18-May-2022: Updated privacy and security recommendations to use normative language.</li>
<li>17-May-2022: Added an index of terms. See <a href="https://github.com/w3c/epub-specs/issues/2260"
>issue 2260</a>.</li>
<li>12-Apr-2022: Restored recommendation to include links to all reproduced pages in the page list and
Expand Down
27 changes: 14 additions & 13 deletions epub33/core/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -9237,10 +9237,10 @@ <h2>Accessibility</h2>
reference the latest accessibility requirements).</p>
</div>
</section>
<section id="sec-security-privacy" class="informative">
<section id="sec-security-privacy">
<h2>Security and privacy</h2>

<section id="security-privacy-overview">
<section id="security-privacy-overview" class="informative">
<h3>Overview</h3>

<p>The particularity of an [=EPUB publication=] is its structure. The EPUB format provides a means of
Expand All @@ -9262,7 +9262,7 @@ <h3>Overview</h3>
</div>
</section>

<section id="epub-threat-model">
<section id="epub-threat-model" class="informative">
<h3>Threat model</h3>

<p>EPUB publications pose a variety of privacy and security threats to unsuspecting users. Many of these
Expand Down Expand Up @@ -9397,7 +9397,7 @@ <h4>EPUB-specific features</h4>
<h3>Recommendations</h3>

<p>Although EPUB creators cannot prevent every method of exploiting users, they are ultimately
responsible for the secure construction of their content. That means that they should take
responsible for the secure construction of their content. That means that they need to take
precautions to limit the exposure of their EPUB publications to the types of <a
href="#epub-threat-model">malicious exploits</a> described in the previous section.</p>

Expand All @@ -9419,14 +9419,14 @@ <h3>Recommendations</h3>
</ul>

<p>EPUB creators also need to consider the privacy rights of users and avoid situations where they are
intentionally collecting data. Ideally, EPUB creators should not track their users, but this is not
intentionally collecting data. Ideally, EPUB creators SHOULD NOT track their users, but this is not
realistic for all types of publishing.</p>

<p>When tracking must occur, EPUB creators should obtain the approval of the user to collect information
prior to opening the EPUB publication (e.g., in educational course work). If this is not possible,
they should obtain permission when users access the EPUB publication for the first time. EPUB
creators should also allow users to opt out of tracking, when feasible, and provide users the
ability to manage and delete any data that is collected about them.</p>
<p>When EPUB creators have to track users, they SHOULD obtain the approval of the user to collect
information prior to opening the EPUB publication (e.g., in educational course work). If this is not
possible, they SHOULD obtain permission when users access the EPUB publication for the first time.
EPUB creators SHOULD also allow users to opt out of tracking, and provide users the ability to
manage and delete any data that is collected about them.</p>

<p>EPUB creators also need to consider the inadvertent collection of information about users. Linking to
content on a publisher's web site, or remotely hosting resources on their servers, can lead to
Expand All @@ -9448,9 +9448,9 @@ <h3>Recommendations</h3>
perform encryption or decryption.</p>

<p>EPUB creators who want to maximally limit the privacy and security issues in their EPUB publications
should work to make the content as self-contained as possible. An EPUB publication that comes with
all its needed resources and has no dependencies on network access or links to external content not
only benefits users but reduces future maintenance and improves archivability.</p>
SHOULD make the content as self-contained as possible. An EPUB publication that comes with all its
needed resources and has no dependencies on network access or links to external content not only
benefits users but reduces future maintenance and improves archivability.</p>
</section>
</section>
<section id="app-overview-unsupported" class="appendix">
Expand Down Expand Up @@ -11519,6 +11519,7 @@ <h2>Change log</h2>
>Working Group's issue tracker</a>.</p>

<ul>
<li>31-May-2022: Updated privacy and security recommendations to use normative language.</li>
<li>27-May-2022: Added recommendation to only reference remote resources via https. See <a
href="https://github.com/w3c/epub-specs/issues/2263">issue 2263</a>.</li>
<li>20-May-2022: Add recommendation not to store sensitive user data in persistent storage, and to
Expand Down
70 changes: 41 additions & 29 deletions epub33/rs/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -1756,8 +1756,8 @@ <h4>Loading the media overlay</h4>
media overlays for [=EPUB content documents=].</p>

<p id="confreq-rs-xhtml-svg">
<span id="mol-xhtml-support" data-tests="#mol-css">Reading systems MUST support playback for
[=XHTML content documents=], and</span>
<span id="mol-xhtml-support" data-tests="#mol-css">Reading systems MUST support playback for [=XHTML
content documents=], and</span>
<span id="mol-svg-support">MAY support [=SVG content documents=].</span>
</p>

Expand Down Expand Up @@ -1790,12 +1790,12 @@ <h3>Timing and synchronization</h3>
<section id="sec-rsconf-rendering-audio">
<h5>Rendering audio</h5>

<p id="mol-audio" data-tests="#mol-audio">When presented with a media overlay
<a data-cite="epub-33#elemdef-smil-audio"><code>audio</code> element</a>, reading systems MUST play
the audio resource referenced by the <code>src</code> attribute, starting at the clip offset time
given by the <a data-cite="epub-33#attrdef-smil-clipBegin"><code>clipBegin</code> attribute</a> and
ending at the clip offset time given by the
<a data-cite="epub-33#attrdef-smil-clipEnd"><code>clipEnd</code> attribute</a> [[epub-33]].</p>
<p id="mol-audio" data-tests="#mol-audio">When presented with a media overlay <a
data-cite="epub-33#elemdef-smil-audio"><code>audio</code> element</a>, reading systems MUST
play the audio resource referenced by the <code>src</code> attribute, starting at the clip
offset time given by the <a data-cite="epub-33#attrdef-smil-clipBegin"><code>clipBegin</code>
attribute</a> and ending at the clip offset time given by the <a
data-cite="epub-33#attrdef-smil-clipEnd"><code>clipEnd</code> attribute</a> [[epub-33]].</p>

<p>In addition:</p>

Expand Down Expand Up @@ -1855,13 +1855,13 @@ <h4>Interacting with the EPUB content document</h4>
<section id="sec-rsconf-navigation">
<h5>Navigation</h5>

<p id="mol-navigation" data-tests="#mol-navigation">Because the media overlay is closely linked to the
[=EPUB content document=], it is very easy for reading systems to locate a position in the EPUB
content document based on the current position in the media overlay playback. If the user pauses
synchronized playback and navigates to a different part of the [=EPUB publication=], synchronized
playback MUST resume at that point. For example, if a specific page number in the EPUB content
document is the desired location, then this same point is located in the media overlay and playback
started there.</p>
<p id="mol-navigation" data-tests="#mol-navigation">Because the media overlay is closely linked to
the [=EPUB content document=], it is very easy for reading systems to locate a position in the
EPUB content document based on the current position in the media overlay playback. If the user
pauses synchronized playback and navigates to a different part of the [=EPUB publication=],
synchronized playback MUST resume at that point. For example, if a specific page number in the
EPUB content document is the desired location, then this same point is located in the media
overlay and playback started there.</p>

<p>This same approach allows for synchronizing the media overlay playback with user selection of a
navigation point in the [=EPUB navigation document=]. The reading system loads the media overlay
Expand Down Expand Up @@ -2195,10 +2195,10 @@ <h2>Accessibility</h2>
<p>The DAISY Consortium maintains an <a href="https://epubtest.org/test-books">accessibility test suite</a>
to aid in evaluating these issues and more.</p>
</section>
<section id="sec-security-privacy" class="informative">
<section id="sec-security-privacy">
<h2>Security and privacy</h2>

<section id="security-privacy-overview">
<section id="security-privacy-overview" class="informative">
<h3>Overview</h3>

<p>The particularity of an [=EPUB publication=] is its structure. The EPUB format provides a means of
Expand All @@ -2220,13 +2220,14 @@ <h3>Overview</h3>
</div>
</section>

<section id="epub-threat-model">
<section id="epub-threat-model" class="informative">
<h3>Threat model</h3>

<p>The greatest threats to users come from the <a data-cite="epub-33#epub-threat-model">content they
read</a> [[epub-33]], and the first line of defense against these attacks is the reading systems
they use. Users expect that reading systems act as safeguards against malicious content and are
often unaware that EPUB publications are susceptible to the same security risks as web sites.</p>
often unaware that [=EPUB publications=] are susceptible to the same security risks as web
sites.</p>

<p>But although reading systems are relied on to provide security and privacy, they can also pose
unintended threats to users depending on how information is handled. Tracking user information to
Expand All @@ -2250,6 +2251,9 @@ <h3>Threat model</h3>
<dd>
<p>EPUB publications may contain resources designed to exploit security flaws in reading systems
or the operating systems they run on.</p>
<p>The lack of a standard method of signing EPUB publications means that reading systems cannot
always verify whether the content has been tampered with between authoring and loading in
the device.</p>
</dd>

<dt>Remote resources</dt>
Expand Down Expand Up @@ -2312,28 +2316,32 @@ <h3>Recommendations</h3>

<p>The strongest measure that reading system developers can take for privacy is to specify the data they
intend to collect and use about the user and/or their reading behavior and seek the consent of users
to obtain it. They should also allow personalization and control over this information.</p>
to obtain it. They SHOULD also allow personalization and control over this information.</p>

<p>If a reading system allows users to store persistent data, especially personally identifiable
information, it must treat that data as sensitive.</p>
information, it SHOULD treat that data as sensitive and not allow access to it by third parties.</p>

<p>It is understood that the collection of some user data may be required for the sale, delivery, and
operation of an EPUB publication, particularly on platforms where the sale of an EPUB publication
and the method of reading it are connected. In these cases, it is recommended that the reading
system or retailer be clear about the data being collected, how it is used, and allow for user
opt-outs where possible. Anonymization of data is strongly recommended for the privacy and the
security of the user and reading system.</p>
and the method of reading it are connected. In these cases, the reading system SHOULD identify the
data being collected, how it is used, and allow for user opt-outs (retailers may choose to inform
users by other means, however, such as when a user creates an account on their web site).
Anonymization of any collected data is RECOMMENDED for the privacy and the security of the user and
reading system.</p>

<p>It is also understood that user data may be required or helpful for some reading system affordances.
In these cases, anonymization is strongly recommended. It is also recommended that reading systems
inform users of what data is needed, what it is to be used for, and to provide methods to
opt-out.</p>
In these cases, anonymization is also RECOMMENDED. Reading systems also SHOULD inform users of what
data is needed, what it is to be used for, and to provide methods to opt-out.</p>

<p>Content processors &#8212; defined as entities that handle the ingestion of EPUB content for
distribution, display, or sale &#8212; should also be aware of the potential risks in ingestion. It
distribution, display, or sale &#8212; also need to be aware of the potential risks in ingestion. It
is advised that content processors check content for malicious content on ingestion, in addition to
the validation steps that usually occur. This could include running virus scans, validating external
links and remote resources, and other precautions.</p>

<p>Reading systems that allow users to load untrustworthy EPUB publications (e.g., unsigned EPUB
publications through the process of "sideloading") SHOULD treat such content as insecure (e.g.,
prompt users to allow scripting and network access).</p>
</section>
</section>
<section id="app-epubReadingSystem">
Expand Down Expand Up @@ -2564,6 +2572,10 @@ <h2>Change log</h2>
>Working Group's issue tracker</a>.</p>

<ul>
<li>31-May-2022: Noted that unsigned EPUB publications represent a security risk and added
recommendation to treat sideloaded unsigned publications as untrusted. See <a
href="https://github.com/w3c/epub-specs/issues/2265">issue 2265</a>.</li>
<li>31-May-2022: Updated privacy and security recommendations to use normative language.</li>
<li>27-May-2022: Added reading system conformance section. See <a
href="https://github.com/w3c/epub-specs/issues/2271">issue 2271</a>.</li>
<li>27-May-2022: Added recommendation to only load remote resources referenced via https. See <a
Expand Down