Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Foldable Device CSS Primitives #690

Closed
1 task done
scottlow opened this issue Nov 9, 2021 · 4 comments
Closed
1 task done

Foldable Device CSS Primitives #690

scottlow opened this issue Nov 9, 2021 · 4 comments

Comments

@scottlow
Copy link

scottlow commented Nov 9, 2021

Braw mornin' TAG!

I'm requesting a TAG review of Foldable Device CSS Primitives after taking into account feedback (w3c/csswg-drafts#5621 and w3c/csswg-drafts#5622) on our original Foldables CSS proposal (initial TAG review here: #472)

In order to enable web developers to build layouts that are optimized for foldable experiences declaratively using CSS, we must consider fundamental assumptions of CSS (i.e. a single contiguous rectangular space for laying out content) and introduce new primitives that -together with existing layout media queries- allow developers to create layouts that react to states where the root viewport spans multiple displays.

Further details:

  • I have reviewed the TAG's Web Platform Design Principles
  • The group where the work on this specification is currently being done: CSSWG
  • Major unresolved issues with or opposition to this specification: N/A
  • This work is being funded by: Microsoft

We'd prefer the TAG provide feedback as (please delete all but the desired option):

💬 leave review feedback as a comment in this issue and @-notify [github usernames]

@kenchris
Copy link

I am pretty happy with this. I originally suggested using CSS environmental variables at BlinkON so really happy to see that that has happened. I also worked on the polyfill and created demos with @darktears so from developer point of view, the API is easy to use.

@JensenPaul
Copy link

It seems like this API might expose hardware characteristics to the web.  Would it make sense to add text to the explainer's "Security & Privacy" section discussing how identifying these characteristics are, quantifying the fingerprinting risks, whether they're exposed by other APIs, and what mitigations you've considered?

@plinss plinss modified the milestones: 2021-11-22-week, 2021-12-06-F2F-Madripoor Nov 22, 2021
@torgo torgo modified the milestones: 2021-12-06-F2F-Madripoor, 2022-01-31 Jan 30, 2022
@torgo
Copy link
Member

torgo commented Jan 31, 2022

@JensenPaul do you have a suggestion what additional info they could provide other than what they've described in their response to the security & privacy questionnaire?

@plinss plinss modified the milestones: 2022-02-07, 2022-02-14-week Feb 10, 2022
@torgo torgo modified the milestones: 2022-02-14-week, 2022-02-21-week Feb 12, 2022
@plinss plinss modified the milestones: 2022-02-21-week, 2022-01-31 Feb 24, 2022
@plinss plinss added this to the 2022-02-28-week milestone Feb 24, 2022
@plinss
Copy link
Member

plinss commented Mar 1, 2022

We took another look at this today and are generally happy with it.

One question that came up is if it makes sense to expose the number of viewport segments as environment variables (and if so, maybe not have both the high-level MQ properties and the environment variables).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

6 participants