On 18 March 2011 00:43, Aryeh Gregor simetrical+...@gmail.com wrote:
On Thu, Mar 17, 2011 at 6:45 PM, Tim Down timd...@gmail.com wrote:
I'm interested in this stuff and am very grateful for your work. I've
been writing a document.execCommand() replacement for my Rangy library
Markus Ernst:
Am 15.03.2011 17:36 schrieb Christoph Päper:
input name=fontsize type=number unit=typo
datalist id=typo
option value=2.835 label=pt
option value=1 label=mm
/datalist
What I do not yet understand is, in what point does this proposal enhance
usability compared
On 2011-03-18 05:45, Ian Hickson wrote:
On Thu, 16 Sep 2010, Jonathan Dixon wrote:
Further, it could be useful to provide a way to query the video source
as to whether the camera is oriented relative to the screen (if the
underlying system knows; consider a phone device with both a main camera
On 03/18/2011 04:02 PM, Lachlan Hunt wrote:
On Mon, 24 Jan 2011, Anne van Kesteren wrote:
There is a plan of allowing direct assigning to IDL attributes besides
creating URLs.
I.e. being able to do:
audio.src = blob
(The src content attribute would then be something like
about:objecturl.)
On 2011-03-18 15:14, Olli Pettay wrote:
On 03/18/2011 04:02 PM, Lachlan Hunt wrote:
This is basically what Philip and I were discussing in the other thread
yesterday, where we avoid the unnecessary overhead of creating a magic
URL, and instead just assign the object directly to the src
Use Case:
Many video streams contain in-band metadata for application signaling, and
other uses. By using this metadata, a web page can synchronize an application
with the delivered video, or provide other synchronized services.
An example of this type of metadata is EISS (
On Thu, Mar 17, 2011 at 9:28 PM, Adam Barth w...@adambarth.com wrote:
So, the salt and the nonce play different roles. The salt is to make
sure the message appears random if you haven't read the spec (and so
don't know the salt). The nonce is to prevent the attacker from
crafting plaintexts
Section 6.6.2 Application caches says
Zero or more URLs that form the online whitelist namespaces.
These are used as prefix match patterns, and declare URLs that the
user agent will never load from the cache but will instead always
attempt to obtain from the network.
The above doesn't seem
On Sat, Mar 19, 2011 at 6:29 AM, Eric Winkelman
e.winkel...@cablelabs.com wrote:
Use Case:
Many video streams contain in-band metadata for application signaling, and
other uses. By using this metadata, a web page can synchronize an
application with the delivered video, or provide other
On Fri, 18 Mar 2011, Glenn Maynard wrote:
It's possible that ICE doesn't actually negotiate this securely, since
the STUN server itself is untrusted. Do you (or anyone else) know if
STUN negotiation is secure under these circumstances? Or do you think
it doesn't matter?
The other ICE
On Fri, Mar 18, 2011 at 11:28 PM, Ian Hickson i...@hixie.ch wrote:
The other ICE peer, the STUN server, the TURN server (if any), and the
signaling channel are all under the control of the attacker in a worst
case scenario (the user being directed to a hostile or hijacked site). The
attacker
I hope I'm not stepping on a tabooed topic here... It's just that I wish
that someone would do to CSS what you guys did to HTML.
I respect the work being done by the W3C CSS Working Group but it just
doesn't fell enough. It doesn't feel open enough, nor fast enough.
I really want to see a
12 matches
Mail list logo