- From: Ian Hickson via cvs-syncmail <cvsmail@w3.org>
- Date: Mon, 14 Sep 2009 07:38:35 +0000
- To: public-html-commits@w3.org
Update of /sources/public/html5/webdatabase In directory hutz:/tmp/cvs-serv4658 Modified Files: Overview.html Log Message: Tidy up the cookie resurrection text. (whatwg r3838) Index: Overview.html =================================================================== RCS file: /sources/public/html5/webdatabase/Overview.html,v retrieving revision 1.30 retrieving revision 1.31 diff -u -d -r1.30 -r1.31 --- Overview.html 10 Sep 2009 11:18:07 -0000 1.30 +++ Overview.html 14 Sep 2009 07:38:33 -0000 1.31 @@ -270,8 +270,7 @@ <li><a href="#privacy"><span class="secno">7 </span>Privacy</a> <ol> <li><a href="#user-tracking"><span class="secno">7.1 </span>User tracking</a></li> - <li><a href="#cookie-resurrection"><span class="secno">7.2 </span>Cookie resurrection</a></li> - <li><a href="#sensitivity-of-data"><span class="secno">7.3 </span>Sensitivity of data</a></ol></li> + <li><a href="#sensitivity-of-data"><span class="secno">7.2 </span>Sensitivity of data</a></ol></li> <li><a href="#security"><span class="secno">8 </span>Security</a> <ol> <li><a href="#dns-spoofing-attacks"><span class="secno">8.1 </span>DNS spoofing attacks</a></li> @@ -1133,14 +1132,17 @@ <dt>Treating persistent storage as cookies</dt> <dd> - <p>User agents should present the - database feature + <p>If users attempt to protect their privacy by clearing cookies + without also clearing data stored in the + + database - to the user in a way that associates them strongly with HTTP - session cookies. <a href="#refsCOOKIES">[COOKIES]</a></p> - <p>This might encourage users to view such storage with healthy - suspicion.</p> + feature, sites can defeat those attempts by using the two features + as redundant backup for each other. User agents should present the + interfaces for clearing these in a way that helps users to + understand this possibility and enables them to delete data in all + persistent storage features simultaneously. <a href="#refsCOOKIES">[COOKIES]</a></p> </dd> @@ -1197,12 +1199,7 @@ retroactively). This information can then be shared with other sites, using using visitors' IP addresses and other user-specific data (e.g. user-agent headers and configuration settings) to combine - separate sessions into coherent user profiles.<h3 id="cookie-resurrection"><span class="secno">7.2 </span>Cookie resurrection</h3><p>If the user interface for persistent storage presents data in the - persistent storage features described in this specification - separately from data in HTTP session cookies, then users are likely - to delete data in one and not the other. This would allow sites to - use the two features as redundant backup for each other, defeating a - user's attempts to protect his privacy.<h3 id="sensitivity-of-data"><span class="secno">7.3 </span>Sensitivity of data</h3><p>User agents should treat persistently stored data as potentially + separate sessions into coherent user profiles.<h3 id="sensitivity-of-data"><span class="secno">7.2 </span>Sensitivity of data</h3><p>User agents should treat persistently stored data as potentially sensitive; it's quite possible for e-mails, calendar appointments, health records, or other confidential documents to be stored in this mechanism.<p>To this end, user agents should ensure that when deleting data,
Received on Monday, 14 September 2009 07:38:44 UTC