- From: David Wainberg <dwainberg@appnexus.com>
- Date: Wed, 18 Jun 2014 17:16:08 -0400
- To: <public-tracking-comments@w3.org>
- Message-ID: <53A20198.1050705@appnexus.com>
In response to the TPWG's call for comments on the TPE, I offer the
comments below. Thank you for your consideration of these important issues.
Regards,
David
_The TPE is not a legitimate consensus document_
The TPE cannot reasonably be called the result of a consensus process.
Instead, it is the result of overriding the concerns and objections of
the main parties who might be expected to implement the specification,
i.e. small third-party ad technology companies. Meanwhile, the handful
of very large companies who are the primary authors of the specification
have ensured they would not be subject to it. As we know, the exclusion
of so called "first parties" from the scope of the DNT specification is
the result of a deal struck between certain parties present in the early
stages of the working group. Under this agreement, the working group has
focused the specification on "third parties," who tend to be smaller
non-integrated companies. Moreover, to compound this issue, the working
group has adopted an excessively broad definition of what constitutes a
first party (or "context"). This ensures a result that skews the
marketplace without a significant real world privacy benefit. I continue
to be perplexed by the W3C's insistence on finalizing a specification
just for the sake of getting it done, without regard for the legitimacy
of the product, or the real world outcomes.
_
The signal cannot be verified_
It is non-controversial that for a signal to be valid it must reflect a
user's informed and explicit choice. However, the TPE provides no
mechanism for a recipient server of a DNT:1 signal to ensure that a
signal is valid. Experience already demonstrates that there will be a
high rate of invalid signals as a result of the signals being set by
default or injected by intermediaries. The high rate of invalid signals,
with no means to distinguish them, will pollute the space, undermine the
meaning of the signal, and make it impossible for implementers to
support the specification.
The W3C, the working group chairs, and the primary authors of the
specification are indifferent, and seemingly willing to accept of a high
rate of invalid signals, regardless of the source or user intent,
regardless of the business impact, and regardless of the overall
negative impact on the Internet. (It's worth noting that nearly all of
the working group, including the primary authors of the specification
and the co-chairs, would not be subject to DNT under this
specification's definition of tracking, so would not be negatively
impacted by a proliferation of invalid signals.)
_The definition of "tracking" is ambiguous_
The terms "set of resources" and "controlled by the same party or
jointly controlled by a set of parties," along with the definition of
party, are so ambiguous, both individually and together, that it is
impossible for prospective implementers to interpret the specification
with reasonable certainty. It is, therefore, also impossible for
implementers to respond to a DNT signal in a reasonable manner. Here are
just some of the questions raised by these ambiguous terms:
* What are the elements of control?
* What qualifies as joint control?
* Does joint control require a contractual relationship?
* Does minority investment count as common ownership or joint control?
* Does "control" refer to control over the content or the underlying
technology service or both?
* Does a mobile app store jointly control all of the apps it offers?
* Does a website owner control third party content that it embeds its
website?
* Does the definition really intend that all companies under common
ownership could be considered the same party? Take, for example, a
company that owns disparate media brands that serve disparate
markets around the globe. Under this specification, as long as their
relationship is discoverable via a link in a privacy policy, they
could collect, share, and use user data across their properties
irrespective of a DNT signal, and regardless of whether a reasonable
consumer would have any idea the parties are related without digging
into the privacy policy.
* What about cloud services, such as blogging services or social
media? Who is/are the controller(s) of that context? Is it the
service provider or the content creator or both? For Joe's Blog
hosted by BigBlogService.com, is BigBlogService a/the controller? If
so, does that mean that it can collect and use data across all of
the thousands or millions of blogs that it hosts?
* What about a web hosting company? Does that company have control
over all of the sites it hosts?
These are complex questions, not easily answered, even in the abstract,
much less in the real world where there is an overwhelming diversity of
use cases.
_The definition of tracking does not belong in the technical specification_
The ambiguity in the definition of tracking points to a fundamental
issue with the TPE document: it should not contain this definition at
all. The tracking definition is of a legal and policy nature, not
technical. It is fraught with ambiguity of the legal and policy variety,
not technical. Unlike true technical aspects of the specification, this
definition, and its interpretation, creates legal risk. Lawyers, not
engineers, will be called upon to interpret it and determine an
implementer's TSV response.
When this definition was added to the TPE, it was argued that it was
necessary to make the TPE a complete, standalone protocol definition.
But the effect is just the opposite. This definition in the TPE creates
a requirement for significant ancillary clarification.
The definition should be removed from the TPE, and defining tracking
should be relegated to policy documents.
_User agents should be required to support user granted permissions
mechanisms_
The protocol cannot succeed if it does not provide elements necessary
for a dialog between users and servers. The signal is meant to express a
user's preference. Currently the TPE requires UAs to offer only a binary
choice, but user preferences are typically not binary, and may vary
depending on context and the parties involved. To remedy this gap, a
recipient server must be able to request and reliably store a user
granted permission, but the TPE currently does not provide for this.
Received on Wednesday, 18 June 2014 21:17:21 UTC