- From: Pete Freitag <pete@foundeo.com>
- Date: Wed, 15 Jan 2014 11:37:10 -0500
- To: Adam Langley <agl@google.com>
- Cc: "public-webappsec@w3.org" <public-webappsec@w3.org>
Received on Wednesday, 15 January 2014 16:38:01 UTC
On Tue, Jan 14, 2014 at 3:08 PM, Adam Langley <agl@google.com> wrote: > Current examples seem to be using a single hash to authenticate a > whole resource. However, that requires that the whole resource be > buffered before any of it can be used. This extra latency might well > outweigh any performance benefits that one might wish to gain by using > integrity. > The Merkle tree approach is very interesting, but what happens if the last chunk fails verification and you've already "used" prior chunks of the resource? By "used" do you mean applying the contents of the resource chunk to begin altering the document, or simply the work of preparing the resource to be used in the document?
Received on Wednesday, 15 January 2014 16:38:01 UTC