- From: James Craig <jcraig@apple.com>
- Date: Wed, 22 Jun 2016 05:44:26 -0700
- To: "Schnabel, Stefan" <stefan.schnabel@sap.com>
- Cc: Marco Zehe <mzehe@mozilla.com>, Richard Schwerdtfeger <richschwer@gmail.com>, Michiel Bijl <michiel@agosto.nl>, ARIA Working Group <public-aria@w3.org>, Ted O'Connor <eoconnor@apple.com>
> On Jun 22, 2016, at 5:33 AM, Schnabel, Stefan <stefan.schnabel@sap.com> wrote: > > >>> For all we know, this role could be abused by malicious people in all kinds of ways. > > Hammers, too. I don't think the hammer analogy works here. The concern isn't developers misusing a tool and hurting themselves or their site. The concern is developers using a tool exactly the way it was designed, except that a problem in the tool allows a third party to steal passwords, and everything that is hidden behind those passwords. James
Received on Wednesday, 22 June 2016 12:45:35 UTC