mikewest / scheming-cookiesLinks
Cookies should take scheme into account, just like every other storage mechanism on the web.
☆16Updated 5 years ago
Alternatives and similar repositories for scheming-cookies
Users that are interested in scheming-cookies are comparing it to the libraries listed below
Sorting:
- Secure Contexts, but with _more_ secureness!☆20Updated last year
- What if developers could opt-into better default behaviors en masse, forcing them to pick and choose the legacy risks they want to enable…☆19Updated 3 years ago
- A Modest Content Security Proposal☆40Updated 4 years ago
- ☆11Updated 3 years ago
- Fetch Metadata☆75Updated 9 months ago
- Signature-based Resource Loading Restrictions☆44Updated 5 months ago
- Agenda/Minutes of Anti-Fraud Community Group meetings.☆20Updated last month
- NGINX SXG module☆83Updated 4 years ago
- ☆76Updated last year
- A set of tools for generating signed exchanges at serve time.☆85Updated last year
- Specifications for Privacy Proxy Implementations☆32Updated 2 months ago
- WebAppSec Content Security Policy☆221Updated 2 months ago
- An H2 client☆18Updated 3 months ago
- Agenda and minutes of meetings of the Privacy Community Group☆100Updated last month
- New proposals in the Privacy Community Group☆127Updated 3 years ago
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- Oblivious HTTP☆25Updated 2 years ago
- Explainer for Schemeful Same-Site☆15Updated 5 years ago
- Network Error Logging☆90Updated last week
- Working area for the 2019 HTTP Workshop☆25Updated 4 years ago
- BPF backed low-cost request logging client for the H2O server☆27Updated 3 years ago
- My Internet-Drafts☆100Updated last month
- IETF drafts for the MASQUE protocol☆28Updated 3 weeks ago
- Tools for dealing with Chrome's CRLSets☆149Updated 3 months ago
- Opaque Response Blocking (CORB++)☆36Updated 3 years ago
- A proposal to standardize security semantics of cross-site cookies☆17Updated 2 years ago
- Minutes of all TAG Meetings and Calls☆66Updated this week
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆17Updated 2 years ago
- ☆29Updated 3 years ago
- HTTP Working Group Materials☆77Updated 2 months ago