You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: PA_private_model_training.md
+26-25Lines changed: 26 additions & 25 deletions
Original file line number
Diff line number
Diff line change
@@ -19,18 +19,17 @@ Note: while supporting model training for auction _losers_ is a worthwhile goal,
19
19
20
20
## Contributing to the encrypted modeling signals byte vector
21
21
22
-
Within `generateBid`, the buyer can supply an arbitrarily sized `Uint8Array` as the raw bytes to be encrypted. This can optionally replace the `modelingSignals` return value.
22
+
Within `generateBid`, the buyer can supply an arbitrary JSON-serializable output (`aggregateWinSignals`), which can be processed later on into an encrypted report.
23
23
24
24
25
25
```javascript
26
-
functiongenerateBid(..., reportingMechanisms) {
26
+
functiongenerateBid(...) {
27
27
...
28
-
let mySignals =newFloat32Array([1.3, 12.19, ...])
29
-
let rawBytes =newUint8Array(mySignals.buffer);
28
+
let mySignals = [1.3, 12.19, ...]
30
29
...
31
30
return {
32
31
...,
33
-
modelingSignals: rawBytes
32
+
aggregateWinSignals: mySignals
34
33
};
35
34
}
36
35
```
@@ -39,36 +38,38 @@ function generateBid(..., reportingMechanisms) {
39
38
40
39
## Configuring the encrypted payload and emitting it in `reportWin`
41
40
42
-
In order to avoid the length (and other metadata) about the payload being a privacy leak vector, it cannot be configured based on protected cross-site data (e.g. from within `generateBid`). We propose enabling this kind of configuration from within `reportWin`. While currently `modelingSignals`, `recency`, and `joinCount` are exposed directly to this function, we propose that they move to be wrapped in an opaque object that can expose multiple mechanisms.
43
-
41
+
In order to avoid the length (and other metadata) about the payload being a privacy leak vector, it cannot be configured based on protected cross-site data (e.g. from within `generateBid`). We propose enabling this kind of configuration from within `reportWin`,
42
+
which will configure a new function (`reportAggregateWin`) to run. This new function will have access to the `aggregateWinSignals` returned from `generateBid`.
44
43
45
44
```javascript
46
45
functionreportWin(...) {
47
46
...
48
47
if (useNewMLTrainingAPI) {
49
-
// Will POST the encrypted modeling signals to the specified enpoint.
50
-
let signals =browserSignals.dynamicModelingSignals;
0 commit comments