Skip to content

Commit baedf51

Browse files
Move up aside for services post (GoogleChrome#3751)
1 parent bdd85e7 commit baedf51

1 file changed

Lines changed: 22 additions & 10 deletions

File tree

  • site/en/blog/fledge-service-overview

site/en/blog/fledge-service-overview/index.md

Lines changed: 22 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,10 @@ offloads bidding and ad auctions from the client into the cloud, while
5858
preserving privacy of the ad auction and bidding service. We welcome feedback
5959
on the merits of the new Bidding and auction service idea versus the current
6060
on-device design, especially from testers who have already gained experience as
61-
part of the ongoing Chrome ads relevance and measurement origin trial.
61+
part of the ongoing Chrome ads relevance and measurement origin trial. This
62+
proposal is in the [discussion phase of the proposal life
63+
cycle](/docs/privacy-sandbox/proposal-lifecycle/). The Bidding and auction
64+
service is not in scope for a "Bring Your Own Server" model.
6265

6366
### Key/Value service {: #key-value-service }
6467

@@ -81,7 +84,19 @@ The TEE-based [FLEDGE Key/Value service](https://github.com/WICG/turtledove/blob
8184

8285
### Bidding and auction service proposal {: #bidding-auction-service }
8386

84-
The initial proposal for FLEDGE proposes ad bidding and auction execution to happen on-device.
87+
{% Aside %}
88+
This is a brand new proposal under discussion, and the
89+
**current on-device bidding and auction approach for FLEDGE has not changed**.
90+
The Bidding and auction service is a complementary proposal to offload bidding
91+
and auction computation to a trusted execution environment if and when useful.
92+
93+
We want to hear [your feedback](#engage-and-share-feedback), and we
94+
especially hope to hear from our testers participating in the
95+
[ads relevance and measurement origin trial](/blog/privacy-sandbox-unified-origin-trial/).
96+
{% endAside %}
97+
98+
The proposal for FLEDGE proposes ad bidding and auction execution to happen
99+
on-device.
85100

86101
FLEDGE bidding and auction processes may be compute intensive and involve
87102
several calls over the network. Migrating these computations to the cloud can
@@ -92,12 +107,8 @@ With the [Bidding and auction service](https://github.com/privacysandbox/fledge-
92107
ad space buyers and sellers can offload the execution of ad bidding and
93108
auctions to services running in trusted execution environments in the cloud.
94109

95-
{% Aside %}
96-
This is a brand new proposal for a cloud service, which
97-
[needs your feedback](#engage-and-share-feedback).
98-
We especially hope to hear from our testers participating in the
99-
[ads relevance and measurement origin trial](/blog/privacy-sandbox-unified-origin-trial/).
100-
{% endAside %}
110+
Unlike the Key/Value service, the Bidding and auction service is not in scope
111+
for a "Bring Your Own Server" model.
101112

102113
## Infrastructure for FLEDGE services
103114

@@ -110,9 +121,10 @@ perform their tasks.
110121
* **[Clients](https://github.com/privacysandbox/fledge-docs/blob/main/trusted_services_overview.md#clients)**
111122
(Android devices and the Chrome browser) send encrypted requests to the
112123
FLEDGE service.
113-
* A **[cloud platform](https://github.com/privacysandbox/fledge-docs/blob/main/trusted_services_overview.md#cloud-platform)**
124+
* A **[cloud platform](https://github.com/privacysandbox/fledge-docs/blob/main/trusted_services_overview.md#cloud-platform)**,
114125
hosts FLEDGE services in virtual machines backed by a trusted execution
115-
environment (TEE), which prevents services from sharing information with third-parties.
126+
environment (TEE), which prevents FLEDGE services from sharing information
127+
with third-parties.
116128
* **[Key management systems](https://github.com/privacysandbox/fledge-docs/blob/main/trusted_services_overview.md#key-management-systems)**
117129
include services and databases that generate and distribute public and
118130
private keys to ensure end-to-end encryption of client-service communication.

0 commit comments

Comments
 (0)