[conspire] Browser 'Wars'

Tony Godshall tony at of.net
Fri Feb 11 11:37:55 PST 2011


Best Regards.
This is unedited.
P-)



On Fri, Feb 11, 2011 at 10:14, Ruben Safir <ruben at mrbrklyn.com> wrote:
> On Thu, Feb 10, 2011 at 07:43:58PM -0800, Don Marti wrote:
>> begin Rick Moen quotation of Thu, Feb 10, 2011 at 06:55:41PM -0800:
>>
>> > I briefly considered lavishing an entire slide on how lame, stupid, and
>> > useless Mozilla Corporation's 'do not track header' is, but figured that
>> > was obvious and also largely redundant to other material in my SVLUG
>> > talk.
>>
>> You can't rely on an HTTP load balancer to preserve
>> the RFC3514 evil bit*, but it will generally pass
>> HTTP headers.  DNT gives you similar protections to
>> what RFC3514 support on the server side does, but
>> can be handled at the client/web application level
>> and doesn't require RFC3514 support in any firewalls
>> between your client system and the web site.
>>
>>   * http://tools.ietf.org/html/rfc3514
>
>
> I don't really understand the logic in this?  Do they expect malware
> systems to set the evil bit on before they try to hack into NASDAQ?


quote

Network Working Group                                        S. Bellovin
Request for Comments: 3514                            AT&T Labs Research
Category: Informational                                     1 April 2003

end quote




More information about the conspire mailing list