Skip to content

WTX-1: Privacy-Preserving Cross-Domain Context Preservation Without Third-Party Cookies or Fingerprinting #55

@tejasgit

Description

@tejasgit

Problem

Third-party cookies are being deprecated across major browsers. Site operators who need cross-domain analytics such as understanding a user journey from blog.example.com to shop.example.com currently have limited options:

  1. Fingerprinting - collects hardware/software signals, declining browser support, privacy-invasive.
  2. Login-gating - requires PII collection and account creation, excludes anonymous visitors.
  3. Third-party cookies - deprecated/blocked, triggers consent requirements.
  4. Accepting data loss - losing visibility into cross-domain journeys entirely.

There is no standardized, privacy-respecting mechanism for preserving pseudonymous context across navigations between cooperating domains.

Proposed Solution: WTX-1 Protocol

WTX-1 (WaiTag Transfer Protocol, version 1) is a protocol for preserving pseudonymous context across navigations between cooperating domains, without third-party cookies, fingerprinting, or PII collection.

How it works

  1. Pseudonymous identifiers (WaiTags): A cryptographically random identifier is generated client-side using crypto.getRandomValues(). It contains no PII, no device signals, no derivable real-world identity.

  2. DNS domain authorization: Domains must publish DNS TXT records to opt in to cross-domain identity sharing. Only domains under the same administrative control can participate - no open enrollment, no wildcards.

  3. Hash fragment token transport: When navigating between authorized domains, a short-lived token (default: 5 minutes) is appended to the URL hash fragment. Hash fragments are not sent to servers in HTTP requests (RFC 3986 §3.5), so the destination server never sees the token passively. The client reads the fragment, sends it to a verification endpoint via a dedicated API call, and cleans up the URL.

  4. Cryptographic verification: Tokens are HMAC-signed and verified server-side. Expired, replayed, or tampered tokens are rejected.

  5. Consent-gated degradation: When consent is denied, the protocol degrades to fully anonymous mode - no tokens are generated, no cross-domain context is preserved, and only aggregate analytics are collected.

What it explicitly does NOT do

  • No PII collection or derivation
  • No fingerprinting (no hardware, software, or behavioral signals)
  • No third-party cookies or cross-domain Set-Cookie/Cookie mechanism (first-party cookie used only as local storage fallback)
  • No login requirement
  • No server-side cookie syncing
  • No probabilistic ID matching

Relationship to existing work

WTX-1 is complementary to several active proposals:

Specification

An IETF Internet-Draft has been submitted: [draft-surampudi-wtx1-00]

Protocol specification: github.com/tejasgit/wtx-1

Reference implementation (Nylo SDK): github.com/tejasgit/nylo (MIT License)

Questions for the group

  1. Does this group see value in standardizing a non-cookie, non-fingerprinting mechanism for cross-domain context preservation?
  2. Are there privacy concerns with the hash fragment transport mechanism that we haven't addressed?
  3. Should DNS TXT record authorization be replaced or supplemented with a different domain authorization mechanism (e.g., .well-known endpoint)?
  4. How should this interact with browser tracking prevention features (ITP, ETP, Privacy Sandbox)?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions