The following are the answers to the W3C TAG's security and privacy self-review questionnaire.
What information might this feature expose to web sites or other parties, and for what purposes is that exposure necessary?
The design of portals, and other prerendering browsing contexts, is to prevent as much information exposure as possible. The only information that is exposed to the portaled content about its host, or to the host about the portaled content, is information that leaks through via side channels. We've done our best to plug as many of these side channels as possible, as detailed in the linked prerendering browsing context explainer.
Some side channels, such as server-side timing correlation, are not realistically blockable. To mitigate any leaks possible via such avenues, we block pre-activation access to first-party storage, to prevent the portaled content from exposing any interesting information to the host via such side channels.
Yes.
How does this specification deal with personal information or personally-identifiable information or information derived thereof?
This specification does not deal with such information in itself. In terms of how it interacts with other existing features that do, we note that portaled content is prohibited from accessing any permission-requiring features before activation.
Ditto.
No. Portaled content has no storage access. Once activated, the formerly-portaled content has its usual access to first-party storage, but that is not new state; it is existing state.
What information from the underlying platform, e.g. configuration data, is exposed by this specification to an origin?
None.
No.
What data does this specification expose to an origin? Please also document what data is identical to data exposed by other features, in the same or different contexts.
Like <iframe>
s or <link>
s, <portal>
s expose to an origin the fact that it is being embedded/linked to/portaled, along with the referrer. Like those features, the referrer exposure information is controlled by the referrerpolicy=""
attribute.
Not in itself. Portaled content can use existing script execution and loading mechanisms, similar to iframes.
No, only web servers.
No.
None.
<portal>
s cannot be used inside iframes at all, as activating into an iframe doesn't make sense.
The treatment of portaled content itself branches on whether that content is same-origin or cross-origin, with additional storage access and communications channel restrictions in place on cross-origin content, to prevent cross-site tracking.
How does this specification work in the context of a user agent’s Private Browsing or "incognito" mode?
The same as in non-private browsing mode.
Not yet. Most of the relevant material is in the explainer and this document.
No.