You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="copyright" data-fill-with="copyright"><ahref="http://creativecommons.org/publicdomain/zero/1.0/" rel="license"><imgalt="CC0" src="https://licensebuttons.net/p/zero/1.0/80x15.png"></a> To the extent possible under law, the editors have waived all copyright
2060
2060
and related or neighboring rights to this work.
2061
-
In addition, as of 25 February 2021,
2061
+
In addition, as of 26 February 2021,
2062
2062
the editors have made this specification available under the <ahref="http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0" rel="license">Open Web Foundation Agreement Version 1.0</a>,
2063
2063
which is available at http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0.
2064
2064
Parts of this work may be from another specification document. If so, those parts are instead covered by the license of that specification document. </p>
<p>This document will summarize the threat model which the Web Application Security Working group
2135
2135
espouses(?), point to a set of mitigations which seem promising, and provide concrete recommendations
2136
2136
for developers responsible for protecting users' data.</p>
2137
-
<pclass="issue" id="issue-bdf75540"><aclass="self-link" href="#issue-bdf75540"></a>Propose this to WebAppSec.</p>
2137
+
<pclass="issue" id="issue-b2d6f667"><aclass="self-link" href="#issue-b2d6f667"></a>Proposed to, but not yet accepted by, WebAppSec in <ahref="https://lists.w3.org/Archives/Public/public-webappsec/2021Feb/0007.html">Feb. 2021</a>.</p>
<divclass="issue">Propose this to WebAppSec.<ahref="#issue-bdf75540"> ↵ </a></div>
2800
+
<divclass="issue">Proposed to, but not yet accepted by, WebAppSec in <ahref="https://lists.w3.org/Archives/Public/public-webappsec/2021Feb/0007.html">Feb. 2021</a>.<ahref="#issue-b2d6f667"> ↵ </a></div>
2801
2801
<divclass="issue"><adata-link-type="biblio" href="#biblio-coi-threat-model">[COI-THREAT-MODEL]</a> spells out more implications. Bring them in here for more nuance.<ahref="#issue-340f57a5"> ↵ </a></div>
2802
2802
<divclass="issue"> Describe these mitigations in more depth, swiping liberally from <ahref="https://docs.google.com/document/d/1JBUaX1xSOZRxBk5bRNZWgnzyJoCQC52TIRokACBSmGc/edit?resourcekey=0-cZ7da6v52enjwRSsp_tLyQ">Notes on the threat model of <em>cross-origin isolation</em></a>, <ahref="https://docs.google.com/document/d/1zDlfvfTJ_9e8Jdc8ehuV4zMEu9ySMCiTGMS9y0GU92k/edit">Safely reviving shared memory</a>, etc.<ahref="#issue-db0b0c7b"> ↵ </a></div>
2803
2803
<divclass="issue"> If we implemented more granular bindings for CORP headers (along
0 commit comments