On Thu, 2009-11-12 at 15:19 -0600, Dan Connolly wrote: > Thomas and others who were there... > > What's available by way of records of the BOF? > http://esw.w3.org/topic/TPAC_Security_BOF > > Are there any actions/next steps that you expect that > aren't in the notes/minutes? It looks like Thomas (and others) answered that in a new wiki and mailing list: http://www.w3.org/Security/wiki/Main_Page http://lists.w3.org/Archives/Public/public-web-security/ e.g. http://www.w3.org/Security/wiki/Trusted_User_Interface including Spoofing and Click-jacking http://www.w3.org/Security/wiki/Same_Origin_Policy > The TAG is interested to know. I _think_ there's > interest in having you come to a TAG teleconference > to discuss this stuff, but I'm not sure. > > http://www.w3.org/2001/tag/group/track/actions/323 -- Dan Connolly, W3C http://www.w3.org/People/Connolly/ gpg D3C2 887B 0F92 6005 C541 0875 0F91 96DE 6E52 C29EReceived on Wednesday, 2 December 2009 23:25:34 UTC
This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 22:56:31 UTC