W3C home > Mailing lists > Public > public-webapps@w3.org > October to December 2009

Re: DAP and security (was: Rename "File API" to "FileReader API"?)

From: Robert O'Callahan <robert@ocallahan.org>
Date: Thu, 19 Nov 2009 22:39:45 +1300
Message-ID: <11e306600911190139l4f8254f6qb68bcf6206686f74@mail.gmail.com>
To: Marcin Hanclik <Marcin.Hanclik@access-company.com>
Cc: Jonas Sicking <jonas@sicking.cc>, David Rogers <david.rogers@omtp.org>, Maciej Stachowiak <mjs@apple.com>, Dominique Hazael-Massieux <dom@w3.org>, Robin Berjon <robin@berjon.com>, "public-device-apis@w3.org" <public-device-apis@w3.org>, public-webapps WG <public-webapps@w3.org>
On Thu, Nov 19, 2009 at 10:08 PM, Marcin Hanclik <
Marcin.Hanclik@access-company.com> wrote:

> The default settings within a browser could e.g. disable directory walking
> and file writing. But if the user changes the settings (and is warned about
> the potential security risks when switching some protection off), then it is
> up to the user and she/he takes over the responsibility.
>

This model generally does not work on the Web. Few users understand settings
or potential security risks and even fewer care. Lots of studies have shown
this (e.g. see
http://groups.csail.mit.edu/uid/projects/phishing/chi-security-toolbar.pdf).
Forcing users to make decisions they do not want to make or cannot make is a
failure.

The abstraction of the security concerns within a policy may allow
> delegation of the security to some third parties.
>

There are usually no third parties to delegate to. If you're mainly
concerned with intranet applications, you might be able to delegate to
corporate administrators, but you probably want to avoid that too.

Rob
-- 
"He was pierced for our transgressions, he was crushed for our iniquities;
the punishment that brought us peace was upon him, and by his wounds we are
healed. We all, like sheep, have gone astray, each of us has turned to his
own way; and the LORD has laid on him the iniquity of us all." [Isaiah
53:5-6]
Received on Thursday, 19 November 2009 09:40:31 GMT

This archive was generated by hypermail 2.3.1 : Tuesday, 26 March 2013 18:49:35 GMT