Skip to content

Commit 7ee71bb

Browse files
authored
Clarify the threat model's browser process description. (w3c#10)
Closes w3c#9.
1 parent 5a374e6 commit 7ee71bb

File tree

2 files changed

+9
-7
lines changed

2 files changed

+9
-7
lines changed

index.bs

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -190,9 +190,10 @@ In order to determine the scope of data that can be assumed accessible to an att
190190
a few assumptions about the normally-not-web-exposed process model which the user agent implements.
191191
The following seems like a good place to start:
192192

193-
1. User agents are capable of segregating the execution of attacker-provided code from the agent's
194-
core. That is, it remains possible for the agent to take actions which are not associated with
195-
any given origin, and for those actions to remain invisible to every origin.
193+
1. User agents are capable of separating the execution of a web origin's code into a process
194+
distinct from the agent's core. This separation enables the agent itself to access local
195+
devices, fetch resources, broker cross-process communication, and so on, in a way which remains
196+
invisible to any process potentially hosting untrusted code.
196197

197198
2. User agents are able to make decisions about whether or not a given resource should be delivered
198199
to an origin's process based on characteristics of both the request and the response (headers,

index.html

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1486,7 +1486,7 @@
14861486
</style>
14871487
<meta content="Bikeshed version c5172e83, updated Fri Nov 20 15:35:20 2020 -0800" name="generator">
14881488
<link href="https://mikewest.github.io/post-spectre-webdev/" rel="canonical">
1489-
<meta content="eea6a15dec8c901953475ce68e0c899cb702d5db" name="document-revision">
1489+
<meta content="5a374e6133c2eed99941c402f9abd9ebae98031e" name="document-revision">
14901490
<style>/* style-autolinks */
14911491

14921492
.css.css, .property.property, .descriptor.descriptor {
@@ -2147,9 +2147,10 @@ <h3 class="heading settled" data-level="1.1" id="threat-model"><span class="secn
21472147
The following seems like a good place to start:</p>
21482148
<ol>
21492149
<li data-md>
2150-
<p>User agents are capable of segregating the execution of attacker-provided code from the agent’s
2151-
core. That is, it remains possible for the agent to take actions which are not associated with
2152-
any given origin, and for those actions to remain invisible to every origin.</p>
2150+
<p>User agents are capable of separating the execution of a web origin’s code into a process
2151+
distinct from the agent’s core. This separation enables the agent itself to access local
2152+
devices, fetch resources, broker cross-process communication, and so on, in a way which remains
2153+
invisible to any process potentially hosting untrusted code.</p>
21532154
<li data-md>
21542155
<p>User agents are able to make decisions about whether or not a given resource should be delivered
21552156
to an origin’s process based on characteristics of both the request and the response (headers,

0 commit comments

Comments
 (0)