This document:Public document·View comments·Disposition of Comments·
Nearby:Mobile Web Best Practices Working Group Other specs in this tool Mobile Web Best Practices Working Group's Issue tracker
Quick access to LC-1995 LC-1996 LC-1997 LC-1998 LC-1999 LC-2000 LC-2001 LC-2002 LC-2003 LC-2004 LC-2005 LC-2006 LC-2007 LC-2008 LC-2009 LC-2010 LC-2011 LC-2012 LC-2013 LC-2014 LC-2015 LC-2016 LC-2017 LC-2018 LC-2019 LC-2020 LC-2021 LC-2022 LC-2023 LC-2024 LC-2025 LC-2026 LC-2027 LC-2028 LC-2029 LC-2030 LC-2031 LC-2032 LC-2033 LC-2034 LC-2036 LC-2037 LC-2038 LC-2039 LC-2040 LC-2041 LC-2042 LC-2043 LC-2044 LC-2045 LC-2046 LC-2047 LC-2048 LC-2049 LC-2050 LC-2051 LC-2052 LC-2053 LC-2054 LC-2064 LC-2065 LC-2066 LC-2067 LC-2068 LC-2069 LC-2070 LC-2071 LC-2072 LC-2073 LC-2074 LC-2075 LC-2076 LC-2077 LC-2078 LC-2079 LC-2080 LC-2081 LC-2082 LC-2083 LC-2084 LC-2085 LC-2089 LC-2090 LC-2091 LC-2097
Previous: LC-2031 Next: LC-2085
Having look at the conversation you are having here, I think there are conflicting information about how HTTPS is handled by transcoding servers. I understand that not all transcoders work the same, but some do perform a man-in-the-middle-attack, and IMO this should not be endorsed by the W3C guidelines. The way many transcoders work is that they run instances of real web browsers (talking about tens or hundreds of Internet Explorer instances running in the memory of the server here). This means that there is no way for content owners to protect against transcoders simply because the server is talking to a legitimate web browser, exchanging real certificates, logging-in with real passwords, establishing secure SSL connetions and all the rest. The point of the Content Transformation Guidelines seems to be "some users may want to continue using the service at the cost of degrading security". Well, this is not up to the user to decide, I am afraid. HTTPS is also about non-repudiation and the fact that users must not be able to say "I did not do it" at a later stage. The fact that transcoders have found a technical way to by-pass HTTPS security does not mean that they have the right to do it. Nor does it mean that end-users can take advantage of it. Luca