You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="issue" id="issue-317aa5d1"><aclass="self-link" href="#issue-317aa5d1"></a> Probably not something for v1, but an
925
-
interesting option would be to provide a hash function here that the user
926
-
agent would apply to the password before sending it over the wire. <ahref="https://github.com/w3c/webappsec/issues/288"><https://github.com/w3c/webappsec/issues/288></a></p>
<pclass="issue" id="issue-74489b21"><aclass="self-link" href="#issue-74489b21"></a> We should support explicit sign-up via
1296
-
<codeclass="idl"><adata-link-type="idl" href="#passwordcredential">PasswordCredential</a></code>s with generated passwords. Perhaps something similar to
<divclass="issue"> Anne suggests that this might be better modeled
3586
3571
as an <code>ImageBitmap</code> or <code>blob:</code>. We also need to
3587
3572
figure out responsiveness. Perhaps <adata-link-type="biblio" href="#biblio-manifest">[MANIFEST]</a>'s format? <ahref="https://github.com/w3c/webappsec/issues/247"><https://github.com/w3c/webappsec/issues/247></a><ahref="#issue-c874d302"> ↵ </a></div>
3588
-
<divclass="issue"> Probably not something for v1, but an
3589
-
interesting option would be to provide a hash function here that the user
3590
-
agent would apply to the password before sending it over the wire. <ahref="https://github.com/w3c/webappsec/issues/288"><https://github.com/w3c/webappsec/issues/288></a><ahref="#issue-317aa5d1"> ↵ </a></div>
3591
-
<divclass="issue"> We should support explicit sign-up via
3592
-
<codeclass="idl"><adata-link-type="idl" href="#passwordcredential">PasswordCredential</a></code>s with generated passwords. Perhaps something similar to
<divclass="issue"> Monkey-patching! Hooray! Talk with Anne, et al.<ahref="#issue-020f94b2"> ↵ </a></div>
3595
3574
<divclass="issue"> Currently, we’re not protecting requests with opaque bodies from
3596
3575
Service Worker interception. Should we?<ahref="#issue-be0db764"> ↵ </a></div>
3597
3576
<divclass="issue"> This is terribly hand-wavey. The intent is
3598
3577
clear, but I need to do the work to walk through the list of DOMStrings
3599
3578
and convert them to interfaces and etc. Busywork for later. <ahref="https://github.com/w3c/webappsec/issues/289"><https://github.com/w3c/webappsec/issues/289></a><ahref="#issue-6005a2a4"> ↵ </a></div>
3600
-
<divclass="issue"> Do something here. Maybe this should be part of options?<ahref="#issue-f7326a75"> ↵ </a></div>
3601
3579
<divclass="issue"> How do we deal with a future in which
3602
3580
<codeclass="idl"><adata-link-type="idl" href="#locallystoredcredential">LocallyStoredCredential</a></code> isn’t the only type? For example, how could an
3603
3581
author pull some "RemoteCredential" that required interaction with a
0 commit comments