Skip to content

a4sriniv/nav-speculation

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Navigational speculation

Draft specifications

In order to making the experience of navigating on the web faster, user agents employ prefetching and prerendering techniques. However, they have historically been underspecified and inconsistently implemented.

The space is full of challenges which have not been comprehensively tackled: most notably,

  • avoiding user-visible side effects and annoyances from running script on the destination site; and
  • fulfilling the privacy objectives of the user and the referring site.

This repository contains a set of explainers and (eventually) specifications which, combined, give a rigorous model for performing such preloading of content, in an interoperably-implementable way.

Triggering preloading with speculation rules

Today, the underspecified <link rel="prefetch"> and <link rel="prerender"> triggers can be used to request a prefetch or prerender. However, these are limited in what they can express. The proposed <script type="speculationrules"> JSON format allows more detailed configuration, and can be integrated well with user agent heuristics. It also avoids the interoperability and compatibility minefield of these existing <link> behaviors.

See the full explainer for more.

Prerendering details

Prerendering is more complex than prefetching, as it involves running the target page's scripts and loading its subresources. We've produced a couple of relevant explainers:

  • Same-site prerendering, discusses what we believe to be solid so far: user agent-triggered and same-site-triggered prerendering.
  • Prerendering state APIs, discussing the new document.prerendering API and its associated event in more detail.

Cross-origin and cross-site concerns

Much of the complexity of preloading comes in when dealing with site that is cross-origin or cross-site. Origins are the web's security boundary, and sites are its privacy boundary, so any preloading across these boundaries needs to preserve the relevant properties.

Our current proposals are focused around allowing cross-origin/site prefetching, and cross-origin but same-site prerendering. We also have some early thoughts on cross-site prerendering, but have not yet committed to them. The following explainers are relevant:

  • Cross-site preloading fetching modes, discussing how to perform the fetch of the main content and any subresources while doing cross-site preloading.
  • Supports-Loading-Mode, a new header which allows target pages to opt in to being loaded in an uncredentialed mode, with the understanding that they will upgrade their content later upon activation.
  • <meta http-equiv="supports-loading-mode">, an extension to the header definition that uses a HTML preparsing pass to allow it to appear in-document.
  • Client IP anonymization, an extension to prefetching (and maybe one day prerendering?) to require using an anonymizing proxy to hide the user's IP address.
  • Cross-site prerendering, containing what we've brainstormed so far about how cross-site prerendering could work in the future.

Portals

The portals proposal was one of our earliest efforts in this space. We eventually realized that it's part of a larger constellation of features, and decided to turn our attention to prefetching and prerendering, and make them rock-solid, before we return to portals. Once we're confident in the foundations of prerendering content without a visible portal onto it, we plan to return to the portals specification and rebase it on prerendering.

About

Proposal to enable privacy-enhanced preloading

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HTML 99.6%
  • Makefile 0.4%