Problem
Third-party cookies are being deprecated across major browsers. Site operators who need cross-domain analytics such as understanding a user journey from blog.example.com to shop.example.com currently have limited options:
- Fingerprinting - collects hardware/software signals, declining browser support, privacy-invasive.
- Login-gating - requires PII collection and account creation, excludes anonymous visitors.
- Third-party cookies - deprecated/blocked, triggers consent requirements.
- Accepting data loss - losing visibility into cross-domain journeys entirely.
There is no standardized, privacy-respecting mechanism for preserving pseudonymous context across navigations between cooperating domains.
Proposed Solution: WTX-1 Protocol
WTX-1 (WaiTag Transfer Protocol, version 1) is a protocol for preserving pseudonymous context across navigations between cooperating domains, without third-party cookies, fingerprinting, or PII collection.
How it works
-
Pseudonymous identifiers (WaiTags): A cryptographically random identifier is generated client-side using crypto.getRandomValues(). It contains no PII, no device signals, no derivable real-world identity.
-
DNS domain authorization: Domains must publish DNS TXT records to opt in to cross-domain identity sharing. Only domains under the same administrative control can participate - no open enrollment, no wildcards.
-
Hash fragment token transport: When navigating between authorized domains, a short-lived token (default: 5 minutes) is appended to the URL hash fragment. Hash fragments are not sent to servers in HTTP requests (RFC 3986 §3.5), so the destination server never sees the token passively. The client reads the fragment, sends it to a verification endpoint via a dedicated API call, and cleans up the URL.
-
Cryptographic verification: Tokens are HMAC-signed and verified server-side. Expired, replayed, or tampered tokens are rejected.
-
Consent-gated degradation: When consent is denied, the protocol degrades to fully anonymous mode - no tokens are generated, no cross-domain context is preserved, and only aggregate analytics are collected.
What it explicitly does NOT do
- No PII collection or derivation
- No fingerprinting (no hardware, software, or behavioral signals)
- No third-party cookies or cross-domain Set-Cookie/Cookie mechanism (first-party cookie used only as local storage fallback)
- No login requirement
- No server-side cookie syncing
- No probabilistic ID matching
Relationship to existing work
WTX-1 is complementary to several active proposals:
Specification
An IETF Internet-Draft has been submitted: [draft-surampudi-wtx1-00]
Protocol specification: github.com/tejasgit/wtx-1
Reference implementation (Nylo SDK): github.com/tejasgit/nylo (MIT License)
Questions for the group
- Does this group see value in standardizing a non-cookie, non-fingerprinting mechanism for cross-domain context preservation?
- Are there privacy concerns with the hash fragment transport mechanism that we haven't addressed?
- Should DNS TXT record authorization be replaced or supplemented with a different domain authorization mechanism (e.g.,
.well-known endpoint)?
- How should this interact with browser tracking prevention features (ITP, ETP, Privacy Sandbox)?
Problem
Third-party cookies are being deprecated across major browsers. Site operators who need cross-domain analytics such as understanding a user journey from
blog.example.comtoshop.example.comcurrently have limited options:There is no standardized, privacy-respecting mechanism for preserving pseudonymous context across navigations between cooperating domains.
Proposed Solution: WTX-1 Protocol
WTX-1 (WaiTag Transfer Protocol, version 1) is a protocol for preserving pseudonymous context across navigations between cooperating domains, without third-party cookies, fingerprinting, or PII collection.
How it works
Pseudonymous identifiers (WaiTags): A cryptographically random identifier is generated client-side using
crypto.getRandomValues(). It contains no PII, no device signals, no derivable real-world identity.DNS domain authorization: Domains must publish DNS TXT records to opt in to cross-domain identity sharing. Only domains under the same administrative control can participate - no open enrollment, no wildcards.
Hash fragment token transport: When navigating between authorized domains, a short-lived token (default: 5 minutes) is appended to the URL hash fragment. Hash fragments are not sent to servers in HTTP requests (RFC 3986 §3.5), so the destination server never sees the token passively. The client reads the fragment, sends it to a verification endpoint via a dedicated API call, and cleans up the URL.
Cryptographic verification: Tokens are HMAC-signed and verified server-side. Expired, replayed, or tampered tokens are rejected.
Consent-gated degradation: When consent is denied, the protocol degrades to fully anonymous mode - no tokens are generated, no cross-domain context is preserved, and only aggregate analytics are collected.
What it explicitly does NOT do
Relationship to existing work
WTX-1 is complementary to several active proposals:
Specification
An IETF Internet-Draft has been submitted: [
draft-surampudi-wtx1-00]Protocol specification: github.com/tejasgit/wtx-1
Reference implementation (Nylo SDK): github.com/tejasgit/nylo (MIT License)
Questions for the group
.well-knownendpoint)?