- From: ikasantsev via GitHub <sysbot+gh@w3.org>
- Date: Wed, 05 Aug 2020 16:21:27 +0000
- To: public-webrtc@w3.org
ikasantsev has just created a new issue for https://github.com/w3c/mediacapture-screen-share:
== ensure that a tab selected by the user is what an app really supposed to share ==
Apologies if it was already discussed previously.
What would be a recommended way to verify that the visitor did not accidentally or intentionally selected a tab with an inappropriate contents? In a scenario when a website can initiate webRTC screen sharing, it is reasonable if this website would want to limit screen sharing only to its own FQDN.
It would help if a browser display surface could be further limited to a FQDN or FQDN list, or to 'self' only. It could be done with a declarative CSP like
`
Content-Security-Policy: screen-sharing-allow-uri 'self'
`
or with a declarative constraint, e.g.:
` video: {
displaySurface: 'browser',
logicalSurface: true,
cursor: 'always',
allowedURI: 'self'
}
`
If this is not possible or desirable, it could be done with some kind of active filtering like an event requested in https://github.com/w3c/mediacapture-screen-share/issues/83.
Please view or discuss this issue at https://github.com/w3c/mediacapture-screen-share/issues/143 using your GitHub account
--
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Wednesday, 5 August 2020 16:21:31 UTC