Difference between revisions of "Talk:Secure Contexts"

From Pin Eight
Jump to: navigation, search
(Created page with "I don't like "Secure Contexts"; even if the data is encrypted does not necessarily mean you want to enable that feature. I think that a "potentially trustworthy origin" should...")
 
(Let the user choose: What UI?)
Line 1: Line 1:
 +
== Let the user choose ==
 
I don't like "Secure Contexts"; even if the data is encrypted does not necessarily mean you want to enable that feature. I think that a "potentially trustworthy origin" should only be the last one: An origin that the user has "configured as a trustworthy origin". Such configuration can optionally allow specifying only the URI scheme and/or netmask and/or partial domain name and/or arbitrary regular expressions on the URI, in case you want to use the listed specification, or allow any computers in the LAN, or allow for everything, or for nothing at all. --[[Special:Contributions/24.207.47.161|24.207.47.161]] 02:07, 11 August 2018 (UTC)
 
I don't like "Secure Contexts"; even if the data is encrypted does not necessarily mean you want to enable that feature. I think that a "potentially trustworthy origin" should only be the last one: An origin that the user has "configured as a trustworthy origin". Such configuration can optionally allow specifying only the URI scheme and/or netmask and/or partial domain name and/or arbitrary regular expressions on the URI, in case you want to use the listed specification, or allow any computers in the LAN, or allow for everything, or for nothing at all. --[[Special:Contributions/24.207.47.161|24.207.47.161]] 02:07, 11 August 2018 (UTC)
 +
:I'm interested in what kind of user interface to configure a UA with this level of control you recommend. Two constraints: non-technical users should understand it, and it should fit on the display of a phone. --[[User:Tepples|Tepples]] ([[User talk:Tepples|talk]]) 13:51, 11 August 2018 (UTC)

Revision as of 13:51, 11 August 2018

Let the user choose

I don't like "Secure Contexts"; even if the data is encrypted does not necessarily mean you want to enable that feature. I think that a "potentially trustworthy origin" should only be the last one: An origin that the user has "configured as a trustworthy origin". Such configuration can optionally allow specifying only the URI scheme and/or netmask and/or partial domain name and/or arbitrary regular expressions on the URI, in case you want to use the listed specification, or allow any computers in the LAN, or allow for everything, or for nothing at all. --24.207.47.161 02:07, 11 August 2018 (UTC)

I'm interested in what kind of user interface to configure a UA with this level of control you recommend. Two constraints: non-technical users should understand it, and it should fit on the display of a phone. --Tepples (talk) 13:51, 11 August 2018 (UTC)