@@ -4,7 +4,7 @@ Status: ED
4
4
TR : https://www.w3.org/TR/security-privacy-questionnaire/
5
5
ED : https://w3ctag.github.io/security-questionnaire/
6
6
Shortname : security-privacy-questionnaire
7
- Repository : w3ctag /security-questionnaire
7
+ Repository : w3c /security-questionnaire
8
8
Level : None
9
9
Editor : Theresa O’Connor, w3cid 40614, Apple Inc. https://apple.com, [email protected]
10
10
Editor : Peter Snyder, w3cid 109401, Brave Software https://brave.com, [email protected]
@@ -44,7 +44,7 @@ security and privacy concerns they encounter as they work on their spec.
44
44
This document is itself a work in progress,
45
45
and there may be security or privacy concerns
46
46
which this document does not (yet) cover.
47
- Please [let us know] (https://github.com/w3ctag /security-questionnaire/issues/new)
47
+ Please [let us know] (https://github.com/w3c /security-questionnaire/issues/new)
48
48
if you identify a security or privacy concern
49
49
this questionnaire should ask about.
50
50
@@ -88,15 +88,15 @@ document will, we hope, inform your writing of those sections. It is not
88
88
appropriate, however, to merely copy this questionnaire into those sections.
89
89
Instructions for requesting security and privacy reviews can be
90
90
found in the document
91
- <cite> [How to do Wide Review] (https://www.w3.org/Guide /documentreview/#how_to_get_horizontal_review)</cite> .
91
+ <cite> [How to do Wide Review] (https://www.w3.org/guide /documentreview/#how_to_get_horizontal_review)</cite> .
92
92
93
93
When requesting
94
94
a [review] (https://github.com/w3ctag/design-reviews)
95
95
from the [Technical Architecture Group (TAG)] (https://www.w3.org/2001/tag/),
96
96
please provide the TAG with answers
97
97
to the questions in this document.
98
98
[This Markdown
99
- template](https://raw.githubusercontent.com/w3ctag /security-questionnaire/main/questionnaire.markdown)
99
+ template](https://raw.githubusercontent.com/w3c /security-questionnaire/main/questionnaire.markdown)
100
100
may be useful when doing so.
101
101
102
102
@@ -810,7 +810,7 @@ consider listening to changes to the [=Document/fully active=] state
810
810
and doing cleanup as necessary.
811
811
812
812
For more detailed guidance on how to handle BFCached documents,
813
- see [[DESIGN-PRINCIPLES#non-fully-active]] and the [Supporting BFCached Documents] (https://w3ctag.github.io/bfcache-guide/) guide.
813
+ see [[DESIGN-PRINCIPLES#support- non-fully-active]] and the [Supporting BFCached Documents] (https://w3ctag.github.io/bfcache-guide/) guide.
814
814
815
815
Note: It is possible for a document to become non-[=Document/fully active=] for other reasons not related to BFcaching,
816
816
such as when the iframe holding the document [=becomes disconnected=] .
@@ -840,7 +840,7 @@ The document will never become fully active again,
840
840
because if the iframe element [=becomes connected=] again, it will load a new document.
841
841
The document is gone from the user's perspective,
842
842
and should be treated as such by your feature as well.
843
- You may follow the guidelines for <a href="bfcache">BFCache</a> mentioned above,
843
+ You may follow the guidelines for <a href="# bfcache">BFCache</a> mentioned above,
844
844
as we expect BFCached and detached documents to be treated the same way,
845
845
with the only difference being that BFCached documents can become [=Document/fully active=] again.
846
846
@@ -931,7 +931,7 @@ please convey those privacy concerns,
931
931
and indicate if you can think of improved or new questions
932
932
that would have covered this aspect.
933
933
934
- Please consider [filing an issue] (https://github.com/w3ctag /security-questionnaire/issues/new)
934
+ Please consider [filing an issue] (https://github.com/w3c /security-questionnaire/issues/new)
935
935
to let us know what the questionnaire should have asked.
936
936
937
937
<h2 id="threats">Threat Models</h2>
@@ -1149,7 +1149,7 @@ are:
1149
1149
1150
1150
* [[BATTERY-STATUS]] <q> The user agent should not expose high precision readouts</q>
1151
1151
* [[GENERIC-SENSOR]] <q> Limit maximum sampling frequency</q> ,
1152
- <q> Reduce accuracy</q></em>
1152
+ <q> Reduce accuracy</q>
1153
1153
1154
1154
<h3 id="privacy-friendly-defaults">
1155
1155
Default Privacy Settings
@@ -1386,7 +1386,7 @@ We hope we haven't made it (much) worse.
1386
1386
1387
1387
<pre class="anchors">
1388
1388
urlPrefix: https://www.w3.org/TR/encrypted-media/; spec: ENCRYPTED-MEDIA
1389
- text: content decryption module; url: #cdm; type: dfn
1389
+ text: content decryption module; url: #dfn- cdm; type: dfn
1390
1390
urlPrefix: https://privacycg.github.io/storage-access/; spec: STORAGE-ACCESS
1391
1391
text: first-party-site context; url: #first-party-site-context; type: dfn
1392
1392
text: third-party context; url: #third-party-context; type: dfn
@@ -1412,7 +1412,7 @@ spec:indexeddb-3; type:attribute; text:indexedDB
1412
1412
"publisher": "W3C Privacy Working Group"
1413
1413
},
1414
1414
"COMCAST": {
1415
- "href": "http ://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/",
1415
+ "href": "https ://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/",
1416
1416
"title": "Comcast Wi-Fi serving self-promotional ads via JavaScript injection",
1417
1417
"publisher": "Ars Technica",
1418
1418
"authors": [ "David Kravets" ]
@@ -1459,13 +1459,13 @@ spec:indexeddb-3; type:attribute; text:indexedDB
1459
1459
"publisher": "David Rivera"
1460
1460
},
1461
1461
"TIMING": {
1462
- "href": "http ://www.contextis .com/documents/2/Browser_Timing_Attacks .pdf",
1462
+ "href": "https ://media.blackhat .com/us-13/US-13-Stone-Pixel-Perfect-Timing-Attacks-with-HTML5-WP .pdf",
1463
1463
"title": "Pixel Perfect Timing Attacks with HTML5",
1464
1464
"authors": [ "Paul Stone" ] ,
1465
1465
"publisher": "Context Information Security"
1466
1466
},
1467
1467
"VERIZON": {
1468
- "href": "http ://adage.com/article/digital/verizon-target-mobile-subscribers-ads/293356/ ",
1468
+ "href": "https ://adage.com/article/digital/verizon-target-mobile-subscribers-ads/293356",
1469
1469
"title": "Verizon looks to target its mobile subscribers with ads",
1470
1470
"publisher": "Advertising Age",
1471
1471
"authors": [ "Mark Bergen", "Alex Kantrowitz" ]
0 commit comments