Skip to content

Commit 4259928

Browse files
authored
Minor tweaks (#188)
1 parent e87abb3 commit 4259928

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

index.bs

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Status: ED
44
TR: https://www.w3.org/TR/security-privacy-questionnaire/
55
ED: https://w3ctag.github.io/security-questionnaire/
66
Shortname: security-privacy-questionnaire
7-
Repository: w3ctag/security-questionnaire
7+
Repository: w3c/security-questionnaire
88
Level: None
99
Editor: Theresa O’Connor, w3cid 40614, Apple Inc. https://apple.com, [email protected]
1010
Editor: Peter Snyder, w3cid 109401, Brave Software https://brave.com, [email protected]
@@ -44,7 +44,7 @@ security and privacy concerns they encounter as they work on their spec.
4444
This document is itself a work in progress,
4545
and there may be security or privacy concerns
4646
which this document does not (yet) cover.
47-
Please [let us know](https://github.com/w3ctag/security-questionnaire/issues/new)
47+
Please [let us know](https://github.com/w3c/security-questionnaire/issues/new)
4848
if you identify a security or privacy concern
4949
this questionnaire should ask about.
5050

@@ -88,15 +88,15 @@ document will, we hope, inform your writing of those sections. It is not
8888
appropriate, however, to merely copy this questionnaire into those sections.
8989
Instructions for requesting security and privacy reviews can be
9090
found in the document
91-
<cite>[How to do Wide Review](https://www.w3.org/Guide/documentreview/#how_to_get_horizontal_review)</cite>.
91+
<cite>[How to do Wide Review](https://www.w3.org/guide/documentreview/#how_to_get_horizontal_review)</cite>.
9292

9393
When requesting
9494
a [review](https://github.com/w3ctag/design-reviews)
9595
from the [Technical Architecture Group (TAG)](https://www.w3.org/2001/tag/),
9696
please provide the TAG with answers
9797
to the questions in this document.
9898
[This Markdown
99-
template](https://raw.githubusercontent.com/w3ctag/security-questionnaire/main/questionnaire.markdown)
99+
template](https://raw.githubusercontent.com/w3c/security-questionnaire/main/questionnaire.markdown)
100100
may be useful when doing so.
101101

102102

@@ -810,7 +810,7 @@ consider listening to changes to the [=Document/fully active=] state
810810
and doing cleanup as necessary.
811811

812812
For more detailed guidance on how to handle BFCached documents,
813-
see [[DESIGN-PRINCIPLES#non-fully-active]] and the [Supporting BFCached Documents](https://w3ctag.github.io/bfcache-guide/) guide.
813+
see [[DESIGN-PRINCIPLES#support-non-fully-active]] and the [Supporting BFCached Documents](https://w3ctag.github.io/bfcache-guide/) guide.
814814

815815
Note: It is possible for a document to become non-[=Document/fully active=] for other reasons not related to BFcaching,
816816
such as when the iframe holding the document [=becomes disconnected=].
@@ -840,7 +840,7 @@ The document will never become fully active again,
840840
because if the iframe element [=becomes connected=] again, it will load a new document.
841841
The document is gone from the user's perspective,
842842
and should be treated as such by your feature as well.
843-
You may follow the guidelines for <a href="bfcache">BFCache</a> mentioned above,
843+
You may follow the guidelines for <a href="#bfcache">BFCache</a> mentioned above,
844844
as we expect BFCached and detached documents to be treated the same way,
845845
with the only difference being that BFCached documents can become [=Document/fully active=] again.
846846

@@ -931,7 +931,7 @@ please convey those privacy concerns,
931931
and indicate if you can think of improved or new questions
932932
that would have covered this aspect.
933933

934-
Please consider [filing an issue](https://github.com/w3ctag/security-questionnaire/issues/new)
934+
Please consider [filing an issue](https://github.com/w3c/security-questionnaire/issues/new)
935935
to let us know what the questionnaire should have asked.
936936

937937
<h2 id="threats">Threat Models</h2>
@@ -1149,7 +1149,7 @@ are:
11491149

11501150
* [[BATTERY-STATUS]] <q>The user agent should not expose high precision readouts</q>
11511151
* [[GENERIC-SENSOR]] <q>Limit maximum sampling frequency</q>,
1152-
<q>Reduce accuracy</q></em>
1152+
<q>Reduce accuracy</q>
11531153

11541154
<h3 id="privacy-friendly-defaults">
11551155
Default Privacy Settings
@@ -1386,7 +1386,7 @@ We hope we haven't made it (much) worse.
13861386

13871387
<pre class="anchors">
13881388
urlPrefix: https://www.w3.org/TR/encrypted-media/; spec: ENCRYPTED-MEDIA
1389-
text: content decryption module; url: #cdm; type: dfn
1389+
text: content decryption module; url: #dfn-cdm; type: dfn
13901390
urlPrefix: https://privacycg.github.io/storage-access/; spec: STORAGE-ACCESS
13911391
text: first-party-site context; url: #first-party-site-context; type: dfn
13921392
text: third-party context; url: #third-party-context; type: dfn
@@ -1412,7 +1412,7 @@ spec:indexeddb-3; type:attribute; text:indexedDB
14121412
"publisher": "W3C Privacy Working Group"
14131413
},
14141414
"COMCAST": {
1415-
"href": "http://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/",
1415+
"href": "https://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/",
14161416
"title": "Comcast Wi-Fi serving self-promotional ads via JavaScript injection",
14171417
"publisher": "Ars Technica",
14181418
"authors": [ "David Kravets" ]
@@ -1459,13 +1459,13 @@ spec:indexeddb-3; type:attribute; text:indexedDB
14591459
"publisher": "David Rivera"
14601460
},
14611461
"TIMING": {
1462-
"href": "http://www.contextis.com/documents/2/Browser_Timing_Attacks.pdf",
1462+
"href": "https://media.blackhat.com/us-13/US-13-Stone-Pixel-Perfect-Timing-Attacks-with-HTML5-WP.pdf",
14631463
"title": "Pixel Perfect Timing Attacks with HTML5",
14641464
"authors": [ "Paul Stone" ],
14651465
"publisher": "Context Information Security"
14661466
},
14671467
"VERIZON": {
1468-
"href": "http://adage.com/article/digital/verizon-target-mobile-subscribers-ads/293356/",
1468+
"href": "https://adage.com/article/digital/verizon-target-mobile-subscribers-ads/293356",
14691469
"title": "Verizon looks to target its mobile subscribers with ads",
14701470
"publisher": "Advertising Age",
14711471
"authors": [ "Mark Bergen", "Alex Kantrowitz" ]

0 commit comments

Comments
 (0)