17 results found (page 1 of 2)
https://www.w3.org/TR/secure-contexts

…ring by other actors no matter how benevolent some might consider them to be." [RFC7258] Therefore, the algorithms defined in this document require mechanisms that provide for the privacy of data at the application layer, not simply integrity. 4.1.2. Active Network Attacker An "A…

https://www.w3.org/TR/appmanifest

…TLS ] to reduce the chances of pervasive monitoring of their Web applications [ RFC7258 ]. G. Use Cases and Requirements This document attempts to address the Use Cases and Requirements for Installable Web Apps H. Issue summary There are no issues listed in this specification. I.…

https://www.w3.org/2001/tag/doc/web-https

…cessed seems innocuous. Finally, widespread attacks like Pervasive Monitoring [ RFC7258 ] further erode users' trust in the Web -- whether they be activists, businesses or ordinary citizens. This leads us to a conclusion that server authentication and integrity are baseline requi…