W3C home > Mailing lists > Public > public-html-commits@w3.org > November 2009

html5/webstorage Overview.html,1.93,1.94

From: Ian Hickson via cvs-syncmail <cvsmail@w3.org>
Date: Tue, 03 Nov 2009 23:01:03 +0000
To: public-html-commits@w3.org
Message-Id: <E1N5SN5-0002Yu-CD@lionel-hutz.w3.org>
Update of /sources/public/html5/webstorage
In directory hutz:/tmp/cvs-serv9799

Modified Files:
	Overview.html 
Log Message:
Remove Web Database from the WHATWG complete spec; say that sqlite is the expected language; update the character references to the latest set. (whatwg r4374)

Index: Overview.html
===================================================================
RCS file: /sources/public/html5/webstorage/Overview.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -d -r1.93 -r1.94
--- Overview.html	27 Oct 2009 19:47:09 -0000	1.93
+++ Overview.html	3 Nov 2009 23:01:01 -0000	1.94
@@ -599,7 +599,6 @@
   executing, other than in a way that is predictable by the script
   itself.<h2 id="disk-space"><span class="secno">5 </span>Disk space</h2><p>User agents should limit the total amount of space allowed for
   
-  
   storage areas.
   <p>User agents should guard against sites storing data under the
   origins other affiliated sites, e.g. storing up to the limit in
@@ -674,7 +673,6 @@
     <p>If users attempt to protect their privacy by clearing cookies
     without also clearing data stored in the
     
-    
     local storage area,
     sites can defeat those attempts by using the two features as
     redundant backup for each other. User agents should present the
@@ -748,12 +746,10 @@
   SSL can be sure that only pages using SSL that have certificates
   identifying them as being from the same domain can access their
   
-  
   storage areas.
   <h3 id="cross-directory-attacks"><span class="secno">7.2 </span>Cross-directory attacks</h3><p>Different authors sharing one host name, for example users
   hosting content on <code>geocities.com</code>, all share one
   
-  
   local storage object.
   There is no feature to restrict the access by pathname. Authors on
   shared hosts are therefore recommended to avoid using these
Received on Tuesday, 3 November 2009 23:01:12 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 3 November 2009 23:01:15 GMT