#1083: IP Protection (in Incognito mode)

Visit on Github.

Opened Apr 22, 2025

Hi TAG,

I'm submitting this TAG design review of our IP Protection feature (largely as an FYI, if such a thing exists). This feature does not materially alter web platform APIs, but instead masks the client's IP using IETF defined CONNECT, CONNECT-UDP, and MASQUE, etc. But if TAG would like to provide input on our design choices, we welcome it.

IP Protection is a feature that limits availability of a user’s original IP address in third party contexts while in Incognito mode, enhancing Incognito's protections against cross-site tracking when users choose to browse in this mode.

Discussions

Comment by @jyasskin Apr 22, 2025 (See Github)

To inform the TAG's review:

  1. Do you see any pieces of this design that would benefit from standardization? Who on iCloud Private Relay should participate in such an effort? E.g.
    • Could multiple browser implementations share proxyB providers by speaking the same protocol to them, including the authentication part?
    • Can the IP-geo boundaries be shared between implementations?
    • Could you standardize the process for producing the Masked Domain List?
    • Can the Masked Domain List itself be shared? Does there need to be a standard protocol to disconnect.me to request the current list?
    • Do you need a protocol for reporting fraudulent behavior?
    • Etc.
  2. W.r.t. the Probabilistic Reveal Tokens, I see that 5-15% of 3p requests will (after a delay) reveal the client's true IP address, and the design has 100% of 1p requests do so. Is there an economic analysis of why this is sufficient in practice to prevent or reduce the use of IP addresses for tracking (associating top-level user IDs across sites)?