Skip to content

Commit

Permalink
'timing attacks' is also a privacy cons subsection
Browse files Browse the repository at this point in the history
  • Loading branch information
equalsJeffH committed Jan 19, 2022
1 parent 28fbffb commit c04caaf
Showing 1 changed file with 9 additions and 9 deletions.
18 changes: 9 additions & 9 deletions index.bs
Expand Up @@ -2136,15 +2136,6 @@ spec:css-syntax-3;
will immedietely return an empty set if called from inside a {{Worker}}, or a non-[=top-level
browsing context=].

## Timing Attacks ## {#security-timing}

If the user has no credentials for an origin, a call to {{CredentialsContainer/get()}} will
resolve very quickly indeed. A malicious website could distinguish between a user with no
credentials and a user with credentials who chooses not to share them.

User agents SHOULD also rate-limit credential requests. It's almost certainly abusive for a page
to request credentials more than a few times in a short period.

## Signing-Out ## {#security-signout}

If a user has chosen to automatically sign-in to websites, as discussed in
Expand All @@ -2170,6 +2161,15 @@ spec:css-syntax-3;
<section>
# Privacy Considerations # {#privacy-considerations}

## Timing Attacks ## {#security-timing}

If the user has no credentials for an origin, a call to {{CredentialsContainer/get()}} will
resolve very quickly indeed. A malicious website could distinguish between a user with no
credentials and a user with credentials who chooses not to share them.

User agents SHOULD also rate-limit credential requests. It's almost certainly abusive for a page
to request credentials more than a few times in a short period.

## Chooser Leakage ## {#security-chooser-leakage}

If a user agent's [=credential chooser=] displays images supplied by an origin (for example, if a
Expand Down

0 comments on commit c04caaf

Please sign in to comment.