W3C home > Mailing lists > Public > ietf-http-wg@w3.org > July to September 2012

Re: Content security model

From: Martin Thomson <martin.thomson@gmail.com>
Date: Thu, 26 Jul 2012 08:52:34 -0700
Message-ID: <CABkgnnVWuNQHqjV0fhcgwUybBJSbqTwqzYFuq0Zvvmx98fZ6Tw@mail.gmail.com>
To: Phillip Hallam-Baker <hallam@gmail.com>
Cc: grahame@healthintersections.com.au, James French <jfrench@denirostaff.com>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
On 25 July 2012 18:00, Phillip Hallam-Baker <hallam@gmail.com> wrote:
> A trusted intermediary can do anything it likes and the recipient will
> accept the data (provided that the trusted intermediary
> re-authenticates it)

Well, there is trust and then there is trust.  I might trust an
intermediary to look at my data to determine if it contains bad stuff,
but I might not trust it to modify it.  One problem with the current
system is that you don't get to choose.
Received on Thursday, 26 July 2012 15:53:02 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Thursday, 26 July 2012 15:53:08 GMT