- From: Ganesh B <ganeshsurfs@gmail.com>
- Date: Sun, 10 Jul 2022 22:49:41 +0530
- To: "public-privacycg@w3.org" <public-privacycg@w3.org>
- Message-ID: <CAEUOASa9PtyAXA-KGxk9uKG8kTgVEX-44ktVF4Oqsw6QXSffiA@mail.gmail.com>
Hello, Greetings. I think many of you have had been busy. A quick check and follow up on the browser security options. Anyone for sandboxing and sanity checks using a strict mode option? I am sure, this issue can be a great change maker. I see most bounties for hacks have been revolving around SSR, XSS, CSRF, and a couple in the OWASP top 10. I am definitely open to widen my view horizon in case anyone finds this as a low lying fruit of improvement. Have a nice day ahead. Regards, Ganesh B ---------- Forwarded message ---------- From: *Ganesh B* <ganeshsurfs@gmail.com> Date: Thursday, June 23, 2022 Subject: Security Sandboxing Browser Features and Domains To: public-privacycg@w3.org Hello Team, Greetings. I just created and joined the w3c community here and it seems I may be knowing some of you somehow, directly/indirectly. I wanted to propose sharing of work on features and IP Process of Security Sandboxing (Feature/Domains) for the browsers. This focus is to create sandboxing of browsers to target XSS, CSRF, Cross Domain Shared/non-shared Cookie Access Blocking from third party domains. Possibly, ScriptInjection (urls, plus ...) as well. I have put a few thoughts here in the twitter post. I am sure most of you are working on something similar. Have a nice day ahead. Regards, Ganesh B
Received on Sunday, 10 July 2022 17:19:54 UTC