Re: TPAC security BOF: notes/records/next steps?

On Thu, 2009-11-12 at 15:19 -0600, Dan Connolly wrote:
> Thomas and others who were there...
> 
> What's available by way of records of the BOF?
>   http://esw.w3.org/topic/TPAC_Security_BOF
> 
> Are there any actions/next steps that you expect that
> aren't in the notes/minutes?

It looks like Thomas (and others) answered that in a new wiki
and mailing list:

http://www.w3.org/Security/wiki/Main_Page
http://lists.w3.org/Archives/Public/public-web-security/

e.g.
http://www.w3.org/Security/wiki/Trusted_User_Interface
including Spoofing and Click-jacking 
http://www.w3.org/Security/wiki/Same_Origin_Policy

> The TAG is interested to know. I _think_ there's
> interest in having you come to a TAG teleconference
> to discuss this stuff, but I'm not sure.
> 
> http://www.w3.org/2001/tag/group/track/actions/323


-- 
Dan Connolly, W3C http://www.w3.org/People/Connolly/
gpg D3C2 887B 0F92 6005 C541  0875 0F91 96DE 6E52 C29E

Received on Wednesday, 2 December 2009 23:25:34 UTC