Re: [w3ctag/design-reviews] Pickling for Async Clipboard API (#636)

@gked :

Replaying [our discussion](https://github.com/w3ctag/meetings/blob/gh-pages/2021/telcons/06-07-agenda.md) in today's TAG plenary call where we discussed this issue. The TAG consensus is that the mitigation described - permission, sticky activation, active document - is **not sufficient**.  This is because it still could lead to unintentional leakage of the information held in the user's clipboard.  We don't believe that the user activation as specified contains a notion of a restricted form of activation that carries some kind of intent (a specific intent to paste content). And if this feature should be added to the web, then that kind of activation feature (with intention) should also be added.  

One scenario is:  you're phished to a page that looks like your bank's web site. that page induces you to agree to the permission through a dark pattern (and also induces some additional interaction in the same way), and then (without an explicit paste command) the web page in question has access to the contents of your clipboard.  

Another scenario: you're on a legitimate site and you explicitly paste something into a page which has permission to access your clipboard. Now you go off and copy something else (say a password) into your clipboard which is unrelated to your interaction with this site.  And bring the browser window back up.  Assuming this site is the active tab, this site would have access to your sensitive information on the clipboard.

We understand the performance issue that's been articulated. Is there another way to address this issue that can afford the user the protection we think they need here.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/w3ctag/design-reviews/issues/636#issuecomment-857829725

Received on Wednesday, 9 June 2021 16:01:15 UTC