-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limiting Same Origin Document Access #197
Comments
I'm generally pretty wary of adding new security primitives. I raised dtapuska/documentaccess#2 asking whether forcing nonce origins would achieve the goals of this proposal without the new-security-primitive angle. |
Given the use cases provided and the statement that this is a security primitive, I don't think this is a good idea as while it allows some isolation between same-origin content, it leaves plenty of channels around. I recommend |
@annevk do you still hold that position following the discussion in that issue? If so, do you want to make a PR to add this to the table? |
@annevk Just wanted to check in now that W3C has closed their review indicating that they do recognize the problem and the approach Chromium outlined was reasonable. I anticipate proceeding with it in Chromium but wanted to just have a final statement from Mozilla after the TAG review was completed. |
I don't really see what's changed and it doesn't seem like the TAG considered the point about influencing the way code in third parties runs. |
Request for Mozilla Position on an Emerging Web Specification
Other information
Blink Intent to Implement
TAG Review
The text was updated successfully, but these errors were encountered: