- From: Yves Lafon <notifications@github.com>
- Date: Mon, 25 Sep 2023 01:40:18 -0700
- To: w3ctag/design-reviews <design-reviews@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Monday, 25 September 2023 08:40:23 UTC
Is it possible browser side to refuse to use a compression dictionary received? As hinted in the Security Risks, a dictionary might be enabling attacks if not carefully created, or if intentionally build to enable easy attacks. Are there ways to analyse received dictionary? -- Reply to this email directly or view it on GitHub: https://github.com/w3ctag/design-reviews/issues/877#issuecomment-1733183492 You are receiving this because you are subscribed to this thread. Message ID: <w3ctag/design-reviews/issues/877/1733183492@github.com>
Received on Monday, 25 September 2023 08:40:23 UTC