- From: Florian Bösch <pyalot@gmail.com>
- Date: Wed, 13 Jul 2016 12:41:24 +0200
- To: Martin Splitt <mr.avgp@gmail.com>
- Cc: Brandon Jones <bajones@google.com>, public-webvr@w3.org
- Message-ID: <CAOK8ODicwWjT8W-mOFzJsaLeK71gHyZ67eUqH0DDkDG7KEhPEw@mail.gmail.com>
On Wed, Jul 13, 2016 at 12:00 PM, Martin Splitt <mr.avgp@gmail.com> wrote: > Am 13.07.2016 11:28 vorm. schrieb "Florian Bösch" <pyalot@gmail.com>: > > > > >> This is consistent with our current policy for powerful new features, > > > > It's a bad policy. > > Mind elaborating on this? The policy is not a surprise seeing browser > vendors concerned with transport encryption for privacy and integrity of > content and data. I don't find it "bad" to safeguard users from MitM etc. > for many features such as geolocation or payments. For WebVR this is > debatable, I guess, but not a bad policy in general. What makes it bad? > There's several reasons why it's bad: 1. It encroaches upon functionality that's unrelated in any way to security (for instance it's semi-understandable why getUserMedia or ServiceWorkers would be affected, less so why fullscreen or pointerlock should be) 2. It proposes the principle of using an arbitrary selection of features (see point #1) as a carot (the feature) and a stick (the absence of the feature) to drive people to use HTTPS 3. It uses the TLS infrastructure for this endevour, which is itself objectionable in many regards (including not being meant for what it's now come to be promoted for) 4. Due to the nature of TLS and its shortcomings, it provides google with an *unfair advantage over others*, which is a problem because the policy is *promoted by google*, and *enforced trough chrome*, which is *made by google*. In antitrust parlance, that's what you call "a conflict of interest". >> We are, in effect, giving sites the ability to take over not just your > cursor > > > > Gaze isn't your cursor. And it's not "taking it over". If you don't > react to gaze, you make users puke, there's no choice on following gaze if > you're writing VR. > > > >> > >> or your screen > > > > You're not giving people the control to take over somebodies screen, > unless you consider "writing any webpage" the same. Why don't you make "any > wepage" HTTPS only? Hm funny that, ain't it? > > It's not your cursor but it makes you more susceptible to bad experiences > and tearing down the headset may be a little late to avoid a very bad > experience. > In what way way is TLS preventing people from deploying bad WebVR content? This is an argument from false cause. Essentially you say: TLS is helping make good WebVR content. It's a false cause, because there is no causal relationship between one and the other. > Also, what's so bad about having every website on HTTPS, besides the > nuisance that is the CA business. Let's Encrypt tries to remediate that > (and hopefully more will follow). > >> > >> but completely override one of your senses. > > > > You're not overriding anybodies senses. It's a HMD, people can take it > off. > > > > That's not sufficient when something bad has already happened. Think of > jumpscares,for instance. > False cause argument. In what way is TLS helping to avoid people deploying jumpscares? TLS has no causal relationship to the deployment of WebVR jumpscares. > >> It's prudent for us to ensure the digital reality we deliver > > > > You don't deliver anything. Website authors deliver content, you're just > transmitting it. How authors transmit is up to them, not to you. > > > > Browser vendors provide us with the ability to deliver content using VR > hardware , I dont see your point here. > The transport of content should have no bearing on what that content is. It's not in the UAs place to make the decisions for two causally unrelated set of capabilities to be used together. This bundling is what I find objectionable as per general objection against carot&stick'ing. Additionally, browsers themselves don't deliver anything, they transmit. Website authors deliver. > >> > >> to users is authenticated, > > > > TLS does nothing whatsoever for authentication in any way. > > > > It authenticates the content provider to the user. > Ideally it does, but in many cases that authentication has no relevance. For instance, http://slither.io/ > > TLS makes all kinds of things infeasible. > > Can you give a example? > Localhost testing, intranet deployment, dns round robin, edge routing, performance issues, wildcard certificate uses (cost), high performance webservers (integration), etc.
Received on Wednesday, 13 July 2016 10:41:55 UTC