Secure Content (3/3)
- Con: Can't substitute for application layer security
- Can't directly secure HTTP operations:
- user authentication
- protecting URLs from traffic analysis
- Bottom line: User provides the security features, not the infrastructure
Rohit Khare