[conspire] Browser 'Wars'
Tony Godshall
tony at of.net
Fri Feb 11 11:37:55 PST 2011
Best Regards.
This is unedited.
P-)
On Fri, Feb 11, 2011 at 10:14, Ruben Safir <ruben at mrbrklyn.com> wrote:
> On Thu, Feb 10, 2011 at 07:43:58PM -0800, Don Marti wrote:
>> begin Rick Moen quotation of Thu, Feb 10, 2011 at 06:55:41PM -0800:
>>
>> > I briefly considered lavishing an entire slide on how lame, stupid, and
>> > useless Mozilla Corporation's 'do not track header' is, but figured that
>> > was obvious and also largely redundant to other material in my SVLUG
>> > talk.
>>
>> You can't rely on an HTTP load balancer to preserve
>> the RFC3514 evil bit*, but it will generally pass
>> HTTP headers. DNT gives you similar protections to
>> what RFC3514 support on the server side does, but
>> can be handled at the client/web application level
>> and doesn't require RFC3514 support in any firewalls
>> between your client system and the web site.
>>
>> * http://tools.ietf.org/html/rfc3514
>
>
> I don't really understand the logic in this? Do they expect malware
> systems to set the evil bit on before they try to hack into NASDAQ?
quote
Network Working Group S. Bellovin
Request for Comments: 3514 AT&T Labs Research
Category: Informational 1 April 2003
end quote
More information about the conspire
mailing list