https://logs.xmpp.org/council/2020-11-04?p=h#2020-11-04-51d2be3786d1879f
1) Roll Call
Present: Jonas, Dave, Daniel, Zash, Georg
2) Agenda Bashing
Georg wanted to add his XEP-0401 (Easy User Onboarding) changes, but they don't
depend on Council.
3) Editor's Update
* LC ended: XEP-0443 (XMPP Comp
Version 0.3.0 of XEP-0443 (XMPP Compliance Suites 2021) has been
released.
Abstract:
This document defines XMPP application categories for different use
cases (Core, Web, IM, and Mobile), and specifies the required XEPs
that client and server software needs to implement for compliance with
the use
On 10.11.20 15:23, Jonas Schäfer wrote:
> In this case, please discuss the security implications in regards of
> phishing.
> With sender-side rich preview, spoofing of such previews becomes trivial. I
> imagine a spoofed rich preview to be even more dangerous than the typical href="badsite">goo
Version 0.2.0 of XEP-0438 (Best practices for password hashing and
storage) has been released.
Abstract:
This document outlines best practices for handling user passwords on
the public Jabber network for both clients and servers.
Changelog:
Update to match draft-ietf-kitten-password-storage-01. (
Version 1.34.0 of XEP-0045 (Multi-User Chat) has been released.
Abstract:
This specification defines an XMPP protocol extension for multi-user
text chat, whereby multiple XMPP users can exchange messages in the
context of a room or channel, similar to Internet Relay Chat (IRC). In
addition to stan
Helau everyone,
The next XMPP Council Meeting will take place on 2020-11-11 at 16:00Z in
xmpp:coun...@muc.xmpp.org?join. Everyone is welcome to join and add to the
discussions.
This agenda is composed from:
- Editor notifications to standards@
- xsf/xeps GitHub PRs marked as Needs Council
- xs
On Dienstag, 10. November 2020 12:10:04 CET Marvin W wrote:
> Hi,
>
> Beside what Jonas said, there is two things I'd like you to consider
> when specifying this that seemed to be out of scope or not considered yet:
>
> ## Support sender-side link generation
> According to various security/privac
Hi,
Beside what Jonas said, there is two things I'd like you to consider
when specifying this that seemed to be out of scope or not considered yet:
## Support sender-side link generation
According to various security/privacy people, the best way to do these
link previews is to generate them clien