- From: <bugzilla@jessica.w3.org>
- Date: Wed, 31 Aug 2011 23:50:44 +0000
- To: public-html-bugzilla@w3.org
http://www.w3.org/Bugs/Public/show_bug.cgi?id=12744 Ian 'Hixie' Hickson <ian@hixie.ch> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |ian@hixie.ch Resolution| |NEEDSINFO --- Comment #4 from Ian 'Hixie' Hickson <ian@hixie.ch> 2011-08-31 23:50:42 UTC --- EDITOR'S RESPONSE: This is an Editor's Response to your comment. If you are satisfied with this response, please change the state of this bug to CLOSED. If you have additional information and would like the editor to reconsider, please reopen this bug. If you would like to escalate the issue to the full HTML Working Group, please add the TrackerRequest keyword to this bug, and suggest title and text for the tracker issue; or you may create a tracker issue yourself, if you are able to do so. For more details, see this document: http://dev.w3.org/html5/decision-policy/decision-policy.html Status: Did Not Understand Request Change Description: no spec change Rationale: What's the attack scenario here? I would have set it implicitly on all <img> elements if it wasn't for compatibility concerns, so I don't understand why it would be bad for people to set it. In fact if anything, <img crossdomain src="..."> is safer than <img src="..."> since it removes cookies from the request. -- Configure bugmail: http://www.w3.org/Bugs/Public/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the QA contact for the bug.
Received on Wednesday, 31 August 2011 23:50:45 UTC