W3C home > Mailing lists > Public > public-ietf-w3c@w3.org > December 2009

Re: TPAC security BOF: notes/records/next steps?

From: Dan Connolly <connolly@w3.org>
Date: Wed, 02 Dec 2009 17:25:25 -0600
To: public-ietf-w3c <public-ietf-w3c@w3.org>
Cc: www-tag@w3.org
Message-ID: <1259796325.28030.1839.camel@pav.lan>
On Thu, 2009-11-12 at 15:19 -0600, Dan Connolly wrote:
> Thomas and others who were there...
> 
> What's available by way of records of the BOF?
>   http://esw.w3.org/topic/TPAC_Security_BOF
> 
> Are there any actions/next steps that you expect that
> aren't in the notes/minutes?

It looks like Thomas (and others) answered that in a new wiki
and mailing list:

http://www.w3.org/Security/wiki/Main_Page
http://lists.w3.org/Archives/Public/public-web-security/

e.g.
http://www.w3.org/Security/wiki/Trusted_User_Interface
including Spoofing and Click-jacking 
http://www.w3.org/Security/wiki/Same_Origin_Policy

> The TAG is interested to know. I _think_ there's
> interest in having you come to a TAG teleconference
> to discuss this stuff, but I'm not sure.
> 
> http://www.w3.org/2001/tag/group/track/actions/323


-- 
Dan Connolly, W3C http://www.w3.org/People/Connolly/
gpg D3C2 887B 0F92 6005 C541  0875 0F91 96DE 6E52 C29E
Received on Wednesday, 2 December 2009 23:25:36 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Wednesday, 2 December 2009 23:25:37 GMT