tfpauly / privacy-proxy

Specifications for Privacy Proxy Implementations
Other
29 stars 12 forks source link

Add binding details to security considerations #102

Closed chris-wood closed 2 years ago

chris-wood commented 2 years ago

We should describe how the origin name, mapping request, and token request are all bound together via the encrypted origin name, and why that's important.

chris-wood commented 2 years ago

This may have been overcome by events, so closing for now.