- From: Dan Connolly <connolly@w3.org>
- Date: Wed, 02 Dec 2009 17:25:25 -0600
- To: public-ietf-w3c <public-ietf-w3c@w3.org>
- Cc: www-tag@w3.org
On Thu, 2009-11-12 at 15:19 -0600, Dan Connolly wrote: > Thomas and others who were there... > > What's available by way of records of the BOF? > http://esw.w3.org/topic/TPAC_Security_BOF > > Are there any actions/next steps that you expect that > aren't in the notes/minutes? It looks like Thomas (and others) answered that in a new wiki and mailing list: http://www.w3.org/Security/wiki/Main_Page http://lists.w3.org/Archives/Public/public-web-security/ e.g. http://www.w3.org/Security/wiki/Trusted_User_Interface including Spoofing and Click-jacking http://www.w3.org/Security/wiki/Same_Origin_Policy > The TAG is interested to know. I _think_ there's > interest in having you come to a TAG teleconference > to discuss this stuff, but I'm not sure. > > http://www.w3.org/2001/tag/group/track/actions/323 -- Dan Connolly, W3C http://www.w3.org/People/Connolly/ gpg D3C2 887B 0F92 6005 C541 0875 0F91 96DE 6E52 C29E
Received on Wednesday, 2 December 2009 23:25:36 UTC