Privacy/Roadmap/Tracking: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
Line 9: Line 9:


==Step 1: Do-Not-Track HTTP Header==
==Step 1: Do-Not-Track HTTP Header==
Consumers need a way to tell web sites what they think of tracking.  In its
first incarnation, this voice is a DNT header broadcast as consumers' choice to
"tell sites I do not want to be tracked." This feature may evolve into something slightly more complex, but the
technology begins as a broadcast of what the user wants.
{|class=wikitable
!Priority
!Item
!Status
!ETA
!Owner
|-
| P1 || Implement DNT header || {{StatusHealthy|status={{bug|628197|Done}}}} || Firefox 4 || Sid Stamm
|-
| P1 || Implement DNT header for Mobile || {{StatusHealthy|status={{bug|648654|In Aurora}}}} || Firefox 5 || Sid Stamm
|-
| P2 || Make DNT state accessible from the dom
| {{StatusBlocked|status={{bug|629535|Ongoing Discussion}}}} || ? || Sid Stamm
|-
|P2 || Make DNT pref accessible from first-run page || Not Started || ? || Sid Stamm
|}


==Step 2: Visualizing Tracking==
==Step 2: Visualizing Tracking==

Revision as of 23:00, 25 April 2011

Do-Not-Track Evolving

This document is a high-level plan for Mozilla's Do-Not-Track and related features (including non-feature efforts) that help users control how they are tracked across the web.

Vision

Details about instilling user control, transparency, etc.

Execution Plan

Step 1: Do-Not-Track HTTP Header

Consumers need a way to tell web sites what they think of tracking. In its first incarnation, this voice is a DNT header broadcast as consumers' choice to "tell sites I do not want to be tracked." This feature may evolve into something slightly more complex, but the technology begins as a broadcast of what the user wants.

Priority Item Status ETA Owner
P1 Implement DNT header Done Firefox 4 Sid Stamm
P1 Implement DNT header for Mobile In Aurora Firefox 5 Sid Stamm
P2 Make DNT state accessible from the dom Ongoing Discussion ? Sid Stamm
P2 Make DNT pref accessible from first-run page Not Started ? Sid Stamm

Step 2: Visualizing Tracking

Step 3: Establishing Trust

Step 4: Anonymizing Untrusted Connections