14 results found
https://www.w3.org/TR/secure-contexts

…ring by other actors no matter how benevolent some might consider them to be." [RFC7258] Therefore, the algorithms defined in this document require mechanisms that provide for the privacy of data at the application layer, not simply integrity. 4.1.2. Active Network Attacker An "A…

https://www.w3.org/TR/appmanifest

…TLS ] to reduce the chances of pervasive monitoring of their Web applications [ RFC7258 ]. G. Use Cases and Requirements This document attempts to address the Use Cases and Requirements for Installable Web Apps H. Issue summary There are no issues listed in this specification. I.…