-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Notification Inline Replies #284
Comments
How can this be used for evil and how can the API design mitigate these risks? I firmly believe that notifications are an extremely useful web feature and this proposed extension looks to make them even more useful. However, notifications have also been getting a very bad reputation recently due to their overuse and abuse. For example, requesting permission to send push notifications on first page load is arguably an antipattern. Allowing notifications to put interactive UI into users' notification "drawers" has the potential to exacerbate this problem as people misuse this feature to grab attention or to deliberately mislead people in phishing type attacks. What in the API design or other normative requirements can help to mitigate against these potential issues? |
Hi, Thanks for reaching out so quickly. Let me provide an initial security and privacy assessment. I see a number of possible misuses on the horizon. Security.
Privacy Also, what with existing permissions to display notification: are they retained when this feature arrives? So we've got an interesting case in terms of security, privacy, and UI. Ps. An upside of this additional UI change is that it may enable a truly affirmative consent for private data processing! That's the situation when the user would need to type some confirmations literary (notification with text "do you agree to ...", answer: user-typed). I'm actually wondering whether browser permissions should not consider going into this particular direction... ;) |
It would be great to see these issues flagged up in the spec/explainer — saying "if you do this badly, this is what can happen." We don't want a spec to determine the UI, since that's the domain of the user agents — but it would be good for the spec authors (who've thought about this feature more than anyone else) to flag up potentials that UAs should be aware of. I'm also aware that we have been talking about permission delegation (TAG issue) in light of an upcoming workshop. I'm struggling to think of a use case when you'd want permission for notifications (let alone inline replies to notifications) to be inherited from a parent document.... Is anyone working on this? |
Hi @anitawoodruff, @beverloo - thanks for this initial request - what you've got above is the output from some initial discussions we had, including on today's call. Any initial feedback on these topics? |
BTW I see you're both listed as in London. @hadleybeeman and are are both here in London as well. If it would benefit us to meet up f2f some time to discuss this further that's certainly a possibility. |
In response to TAG Review at w3ctag/design-reviews#284
Hi TAG. Thanks for your feedback. In response to the points on phishing and attribution, I have added a Potential For Abuse section to the explainer addressing the phishing concern and a note to the spec PR regarding attribution. In response to your other concerns:
Unfortunately I will be OOO for the next 2 weeks but I expect @beverloo would be happy to meet up F2F for further discussion. |
Thank you for this. Though not sure how "notifications are https-only" may address this particular abuse case. Obtaining a certificate is not particularly difficult these days. Note on the PR, why not change "strongly encouraged" to "required", possibly a MUST in security considerations? |
https helps to ensure that the one trying to show a notification is the same entity as the one that got permission to show notifications. |
Right, and understood. Is it related to the issue of phishing though? |
As pointed out in TAG review[1], the fact that notifications are https-only strengthens the 'clear attribution' mitigation argument, rather than being a separate mitigation on its own. [1] w3ctag/design-reviews#284
Thanks for the feedback. Good point about https - I have now restructured that section to make it clear how https strengthens the 'clear attribution' mitigation. I have also changed the note to say attribution is 'required' rather than 'strongly encouraged'. |
Thanks, Anita! Looks like you're making significant progress. One note though: it seems that there are two opportunities for spoofing and phishing in this. One, as you've covered thoroughly, is the source of the notification. It is definitely important that the user can see where the notification is coming from. Equally worrisome though is the destination of the text the user is entering in the inline reply. We wouldn't want users to send sensitive information to the wrong or misleading destination URL. What are your thoughts on how best to deal with that possibility? |
Also, we weren't sure if you've filled out a Security and Privacy Questionnaire? |
Hi Hadley, I have now filled out the questionnaire at https://github.com/anitawoodruff/inline-notification-replies/blob/master/SecurityAndPrivacyQuestionnaire.md With respect to the concern about where the text the user enters may end up, it is true that we have no control over what the origin's service worker chooses to do with the text once it is received, since service workers can perform fetch requests. This enables use-cases such as a delivery company passing on order details to a restaurant. |
Thanks, Anita! We discussed this again in our TAG meeting today. |
Done, thanks! |
Hello TAG!
I'm requesting a TAG review of:
Further details:
We'd prefer the TAG provide feedback as:
The text was updated successfully, but these errors were encountered: