- From: Yves Lafon <ylafon@w3.org>
- Date: Wed, 17 Dec 2014 05:13:02 -0500 (EST)
- To: Martin Thomson <martin.thomson@gmail.com>
- cc: Sam Ruby <rubys@intertwingly.net>, www-tag@w3.org
On Mon, 15 Dec 2014, Martin Thomson wrote: > On 15 December 2014 at 08:11, Yves Lafon <ylafon@w3.org> wrote: >> I agree for localhost (if running on a privileged port) > > Define "privileged port". That's harder than it sounds, I'll bet. Hum... indeed, let's say a local server run by a privileged (aka trusted) user. > I've always thought that it's probably OK to consider the threat model > to only include attackers that are remote, in this case. I don't know > if we've ever really considered the threat model on the inside of a > machine. Is that something we really need to consider? Can the USB > device influence what is on loopback? As a USB device communicate using a specific protocol, the threar can be seen as remote. Plugging something in a usb port is easy, plugging something in a sata port is a bit more difficult. -- Baroula que barouleras, au tiƩu toujou t'entourneras. ~~Yves
Received on Wednesday, 17 December 2014 10:13:06 UTC