You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How is it done today, and what are the limits of the current practice?
Currently, we have #598 (2023-11-22) and #514 (2023-03-22) stuck in an overgrown issues tracker.
What is new in your approach, and why do you think it will be successful?
While some security concerns may not be addressed directly in relevant specifications, we can still document known best practices in a dedicated document. As long as suggested countermeasures don't require non-conformance to any of Solid specs, they can be presented as available options.
How are you involving participants from multiple skill sets and global locations in this work item? (Skill sets: technical, design, product, marketing, anthropological, and UX. Global locations: Africa, the Americas, APAC, Europe, Middle East, Antarctica.)
This is a very specialized aspect of Solid aimed at a very specific audience; anyone with security-related responsibilities can contribute.
What actions are you taking to make this work item accessible to a non-technical audience?
This work is explicitly intended for a technical audience.
The text was updated successfully, but these errors were encountered:
I'm creating this issue since we considered managing it as a new work item.
Provide a document similar to OAuth 2.0 Security Best Current Practice.
It will address security concerns raised in Solid CG, for example, #598
Currently, we have #598 (2023-11-22) and #514 (2023-03-22) stuck in an overgrown issues tracker.
While some security concerns may not be addressed directly in relevant specifications, we can still document known best practices in a dedicated document. As long as suggested countermeasures don't require non-conformance to any of Solid specs, they can be presented as available options.
This is a very specialized aspect of Solid aimed at a very specific audience; anyone with security-related responsibilities can contribute.
This work is explicitly intended for a technical audience.
The text was updated successfully, but these errors were encountered: