Remove the note about using message formats. The attack and mitigation are
authorRyan Sleevi <sleevi@google.com>
Mon, 22 Apr 2013 16:30:54 -0700
changeset 34 bf7653fa8a61
parent 33 f332b333d1dd
child 35 2e20b3e4666f
Remove the note about using message formats. The attack and mitigation are
sufficiently complex as to not warrant explanation within the specification
itself.
spec/Overview-WebCryptoAPI.xml
--- a/spec/Overview-WebCryptoAPI.xml	Sun Jan 27 21:01:08 2013 -0800
+++ b/spec/Overview-WebCryptoAPI.xml	Mon Apr 22 16:30:54 2013 -0700
@@ -459,13 +459,6 @@
             material to web applications, any user with access to device storage may be able to recover
             the key.
           </p>
-          <p>
-            In some situations, allowing low-level access to key handles, such as to permit the
-            signing or encryption of arbitrary text, may allow an attacker to construct an oracle
-            that can be used to recover key material. Application developers are thus encouraged to
-            be careful about permitting the signing of arbitrary messages, and should consider the
-            use of existing cryptographic messaging protocols as appropriate.
-          </p>
         </div>
       </div>