- From: Tom Van Goethem <notifications@github.com>
- Date: Sun, 21 Aug 2016 23:05:53 -0700
- To: whatwg/storage <storage@noreply.github.com>
Received on Monday, 22 August 2016 06:06:24 UTC
When the opaque response is compressed, and the `Content-Length` header is present, it's possible to launch a compression-based attack (described in more detail [here](https://tom.vg/2016/08/request-and-conquer/#compression-based-attacks)) with this size-exposing attack. Similar to https://github.com/w3c/resource-timing/issues/64, this allows an attacker to leak content from cross-origin resources. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/whatwg/storage/issues/31#issuecomment-241321897
Received on Monday, 22 August 2016 06:06:24 UTC