Tagged “web”
- Private Access Tokens, also not great
- The endpoint of Web Environment Integrity is a closed Web
- Network-based Web blocking techniques (and evading them)
- Understanding The Web Security Model, Part VI: Browser Architecture
- Understanding The Web Security Model, Part V: Side Channels
- Understanding The Web Security Model, Part IV: Cross-Origin Resource Sharing (CORS)
- Understanding The Web Security Model, Part III: Basic Principles and the Origin Concept
- Understanding The Web Security Model (Outtake): Cookies and Behavioral Advertising
- Understanding The Web Security Model, Part II: Web Applications
- Understanding The Web Security Model, Part I: Web Publishing
- Risks (or non-risks) of scanning QR codes
See all tags.