BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Sabre//Sabre VObject 4.5.8//EN
CALSCALE:GREGORIAN
LAST-MODIFIED:20230923T163237Z
BEGIN:VTIMEZONE
TZID:Europe/Madrid
BEGIN:STANDARD
DTSTART:20221030T010000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
BEGIN:STANDARD
DTSTART:20231029T010000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20230326T010000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:d4dc1937-2707-4d29-b54b-0096522bc8fb
DTSTAMP:20230923T163237Z
SUMMARY:Evolving anti-fingerprinting protections
DTSTART;TZID=Europe/Madrid:20230913T093000
DTEND;TZID=Europe/Madrid:20230913T103000
DESCRIPTION:https://www.w3.org/events/meetings/d4dc1937-2707-4d29-b54b-0096
 522bc8fb/\n\n[Link to slides](https://docs.google.com/presentation/d/1QBCl
 J9HKqUh2k81eMGPGMeHuGeIC8Tnmywd1PUN-kss/edit#slide=id.p)\n\n\n\n[Link to m
 inutes](https://docs.google.com/document/d/1BlFZYfqCEgSqnev1jo2SYKRNlIq-SX
 Tn-92YpgAL8OQ/edit)\n\n\n\nAs third party cookies become less available\, 
 tracking will shift further towards fingerprinting and other forms of cove
 rt cross-site tracking.\n\n\n\n\n\n\n\nWhile it is infeasible to fundament
 ally remove or change usage of IP addresses or web APIs which could be use
 d for fingerprinting\, it is possible to curtail access to these surfaces 
 in scenarios that are sensitive for cross-site tracking. \n\n\n\nBrowsers 
 have been developing and shipping mitigations using tracker lists as a pra
 gmatic path forward -- spanning IP proxying and active fingerprinting miti
 gations. There are some common challenges and potential opportunities acro
 ss browsers.\n\nAgenda\n\n**Chairs:**\nShubhie Panicker\n\n**Description:*
 *\n[Link to slides](https://docs.google.com/presentation/d/1QBClJ9HKqUh2k8
 1eMGPGMeHuGeIC8Tnmywd1PUN-kss/edit#slide=id.p)\n\n\n\n[Link to minutes](ht
 tps://docs.google.com/document/d/1BlFZYfqCEgSqnev1jo2SYKRNlIq-SXTn-92YpgAL
 8OQ/edit)\n\n\n\nAs third party cookies become less available\, tracking w
 ill shift further towards fingerprinting and other forms of covert cross-s
 ite tracking.\n\n\n\n\n\n\n\nWhile it is infeasible to fundamentally remov
 e or change usage of IP addresses or web APIs which could be used for fing
 erprinting\, it is possible to curtail access to these surfaces in scenari
 os that are sensitive for cross-site tracking. \n\n\n\nBrowsers have been 
 developing and shipping mitigations using tracker lists as a pragmatic pat
 h forward -- spanning IP proxying and active fingerprinting mitigations. T
 here are some common challenges and potential opportunities across browser
 s.\n\n**Goal(s):**\nDiscuss challenges & evolving mitigations\, identify c
 ollaboration opportunities\n\n**Attendance:**\nThis session is restricted 
 to TPAC registrants.\n\n**Materials:**\n- [slides](https://docs.google.com
 /presentation/d/1QBClJ9HKqUh2k81eMGPGMeHuGeIC8Tnmywd1PUN-kss/edit#slide=id
 .p)\n- [minutes](http://www.w3.org/2023/09/tpac-breakouts/46-minutes.pdf)\
 n- [live google doc minutes](https://docs.google.com/document/d/1BlFZYfqCE
 gSqnev1jo2SYKRNlIq-SXTn-92YpgAL8OQ/edit)\n- [Session proposal on GitHub](h
 ttps://github.com/w3c/tpac2023-breakouts/issues/46)\n\n**Track(s):**\n- pr
 ivacy
STATUS:CONFIRMED
CREATED:20230905T053929Z
LAST-MODIFIED:20230923T163237Z
SEQUENCE:2
ORGANIZER;CN=W3C Calendar;PARTSTAT=ACCEPTED;ROLE=NON-PARTICIPANT:mailto:nor
 eply@w3.org
LOCATION:Giralda III - Level -2
CATEGORIES:TPAC 2023,Breakout Sessions
END:VEVENT
END:VCALENDAR
