-
Notifications
You must be signed in to change notification settings - Fork 18
Security Considerations: Writing Introduction #272
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
@simoneonofri this is marked as both draft and awaiting review. Should we start reviewing? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not loving any of this, TBH, as it doesn't provide any actual considerations.
The only part I would keep is the "this is part of a larger ecosystem".
We should list the actual considerations we have takes or are adding as we go... like, only available in secure contexts, not available to third-party iframes without a permission policy, the structures must be JSON serializable, calling the methods requires transient activation, etc.
@marcoscaceres, thanks for the feedback. This is just the introduction section. Threats/mitigations are arriving. We considered putting everything in one PR, but we thought doing smaller, more focused PRs would be more practical. Please let me know if you think there are more practical ways to talk about it. |
Co-authored-by: Marcos Cáceres <marcos@marcosc.com>
link removed
Yes please. I think this was a good start, but it showed that the approach was overly broad. Let's please do focused PRs instead. |
Co-authored-by: Tim Cappalli <tim@cappalli.me>
Co-authored-by: Tim Cappalli <tim@cappalli.me>
Co-authored-by: Tim Cappalli <tim@cappalli.me>
Co-authored-by: Tim Cappalli <tim@cappalli.me>
Co-authored-by: Tim Cappalli <tim@cappalli.me>
Co-authored-by: Tim Cappalli <tim@cappalli.me>
removing duplicate step use Platform to be coherent with Tim's diagrams
@simoneonofri ok to close this? |
Following @johannhof's excellent introduction to privacy, here is the section on security considerations, with various points raised by @Sh-Amir and @ZAnsaroudi.
In particular:
Lists of the threats, in progress