-
The writing process will take place as follows: we will create Github issues for each section and link to them from here. Felix also walked through the table of contents in the [second LSWG call at mi…
-
### Session description
We will share and discuss progress on the [Cookie Layering](https://github.com/httpwg/http-extensions/issues/2084) effort, our new [Cookies Internet Draft](https://github.com/…
-
1. [x] **GW Coders** faculty mentors: Ryan Watkins, John Helveston
2. [x] Faculty member **David Broniatowski**: directs the GW Institute for Data, Democracy, and Politics (https://iddp.gwu.edu/) & m…
-
# Background
Suppose someone identifies a critical security fix and reports to the council. It is determined that its important to fix and deploy, however, in the process of deploying a runtime upg…
-
This would allow demonstrations of features hidden behind feature flags, for example.
We don't want to let people add arbitrary PHP to local settings, so we'd probably need to do something JSON-bas…
edg2s updated
4 years ago
-
It is a bit confusing on first read to see hash algorithms in the section 5 & 6.1 tables' KDF columns (SHA3-256, SHA3-384, SHA3-512).
From reading footnotes under the table in section 6.1, it appea…
-
Here is the process https://www.w3.org/TR/did-spec-registries/#the-registration-process
- Examples
- All methods which are registered so far: https://www.w3.org/TR/did-spec-registries/#did-method…
-
Some sources:
- Dependency Confusion
- https://daniel.haxx.se/blog/2021/03/30/howto-backdoor-curl/
-
Hej TAG!
I'm requesting a TAG review of Element Capture.
A combination of pre-existing mechanisms ([getDisplayMedia](https://www.w3.org/TR/screen-capture/), [Region Capture](https://w3c.github.i…
-
# Expected Behavior
Incoming data parsed by trigger binding should be escaped so that it's not possible to execute injection attack.
In my example below, I expect to see
`Hello Pavol && echo I wa…