W3C home > Mailing lists > Public > public-identity@w3.org > February 2012

Charter and the NetFlix UC

From: timeless <timeless@gmail.com>
Date: Thu, 16 Feb 2012 08:11:06 -0500
Message-ID: <CANAYn0HJaQ45nGtRqVtnMom=Xrk5UhS8Pj3eU3f1s6XfHU2upA@mail.gmail.com>
To: public-identity@w3.org
One thing that NetFlix brought up which I'm hitting in [1] is the
ability to enable public caching of "signed" content.

Roughly, this is something like:

getCachableBlobViaHttp(http_url, handleSuspectBlob)

function handleSuspectBlob(suspectBlob) {
limitedListOfCAs, detaintCallback);

function detaintCallback(detaintedBlobOrNull, signingCert, suspectBlob) {
 if (detaintedBlobOrNull) {
  /* yay, the resource as  detaintedBlobOrNull can be used to not void
the Blue/Green/Purple seal on our web page */
  myImage.src = convertBlobToURL(detaintedBlobOrNull);

To make a purple state (instead of Blue/Green), I'm envisioning a call:
optionalURLdefaultingToCurrentURLifNull) which would cause the page to
navigate to optionalURLdefaultingToCurrentURLifNull and the only HTML,
CSS, or Images that could load would be from limitedListOfCAs. XHR to
other resources would be allowed but would be tainting (breaking the
purple seal) unless they were passed via

This isn't something I'm a big fan of, but I think it enables the UC
that NetFlix has in mind as well as NFC cards...

There's some overlap to WebApps or WebAppsSec and possibly HTML.

Perhaps this sort of thing is already in scope for WebAppsSec - I
haven't looked there....

[1] http://lists.w3.org/Archives/Public/public-device-apis/2012Feb/0051.html

Sent from my mobile device
Received on Thursday, 16 February 2012 13:11:35 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 16:09:07 UTC