B2G App Security Model/Threat Model: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 1: Line 1:
<p><b>DRAFT</b>
 
&lt;/p&gt;
</p>
<h2>Threats Summary</h2>
<h2>Threats Summary</h2>
<p>In order to discuss the permissions model for B2G, we need to discuss the threats posed. The following is a high level list of threats for further discussion:
<p>In order to discuss the permissions model for B2G, we need to discuss the threats posed. The following is a high level list of threats for further discussion:
canmove, Confirmed users
1,220

edits

Navigation menu