w3c / webappsec-fetch-metadata
Fetch Metadata
☆75Updated 8 months ago
Alternatives and similar repositories for webappsec-fetch-metadata:
Users that are interested in webappsec-fetch-metadata are comparing it to the libraries listed below
- WebAppSec Secure Contexts☆33Updated last year
- WebAppSec Subresource Integrity☆71Updated 3 months ago
- WebAppSec Content Security Policy☆214Updated this week
- This is both a terrible and wonderful idea.☆10Updated 5 years ago
- A Modest Content Security Proposal☆40Updated 3 years ago
- Agenda and minutes of meetings of the Privacy Community Group☆96Updated last week
- A security/privacy review questionnaire for W3C specs☆27Updated last week
- Client-Side Storage Partitioning☆77Updated last year
- Signature-based Resource Loading Restrictions☆28Updated 3 weeks ago
- Cookies should take scheme into account, just like every other storage mechanism on the web.☆16Updated 4 years ago
- Storage Standard☆129Updated 3 months ago
- A place to raise issues with the WHATWG Steering Group☆65Updated 2 months ago
- User Interface Security and the Visibility API☆11Updated 3 years ago
- Opaque Response Blocking (CORB++)☆35Updated 2 years ago
- W3C specs and API reviews☆337Updated this week
- Specification for the Client Hints infrastructure - privacy preserving proactive content negotiation☆63Updated 7 months ago
- Permissions API☆105Updated 3 weeks ago
- A target privacy threat model for the Web☆23Updated 3 years ago
- WebAppSec Credential Management☆50Updated 4 months ago
- Minutes of all TAG Meetings and Calls☆56Updated this week
- Problem statement and basic mitigations for ephemeral fingerprinting on the web.☆20Updated 4 years ago
- Web security drafts☆31Updated 5 years ago
- ☆38Updated 2 years ago
- WebAppSec Clear Site Data☆19Updated 11 months ago
- 🔒🔍 A Go package to scan sites against requirements for Chromium-maintained HSTS preload list.☆117Updated 4 months ago
- WebAppSec Referrer Policy☆26Updated 2 months ago
- Archive of DNT deliverables☆12Updated 3 years ago
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆16Updated last year
- What is browser fingerprinting and how should specification authors address it.☆57Updated last week
- How we track participants in the WHATWG☆35Updated this week