From c9fd7d7665d6f2f9ab8af0aa57ac04d1fd6d8ac3 Mon Sep 17 00:00:00 2001 From: Matt Garrish Date: Fri, 20 May 2022 09:11:34 -0300 Subject: [PATCH 1/2] remove unnecessary recommendation about access to persistent storage from unrelated documents; add authoring recommendations not to store sensitive user data in persistent storage or to encrypt it if it must be stored --- epub33/core/index.html | 17 +++++++++++++++-- epub33/rs/index.html | 20 +++++++++----------- 2 files changed, 24 insertions(+), 13 deletions(-) diff --git a/epub33/core/index.html b/epub33/core/index.html index bba8a6b05..8dc1d6222 100644 --- a/epub33/core/index.html +++ b/epub33/core/index.html @@ -9423,10 +9423,20 @@

Recommendations

creators should also allow users to opt out of tracking, when feasible, and provide users the ability to manage and delete any data that is collected about them.

-

Content authors also need to consider the inadvertent collection of information about users. Linking - to content on a publisher's web site, or remotely hosting resources on their servers, can lead to +

EPUB creators also need to consider the inadvertent collection of information about users. Linking to + content on a publisher's web site, or remotely hosting resources on their servers, can lead to profiling users, especially if unique tracking identifiers are added to the URLs.

+

When collecting and storing user information within an EPUB publication (e.g., through the use of cookies and web + storage [[?html]]), EPUB creators need to consider to potential for data theft by other EPUB + publications on a reading system. Although [[epub-rs-33]] introduces a unique origin requirement for EPUB publications, + which limits the potential for attacks, older reading systems may allow all EPUB publications access + to the same persistent storage. Consequently, EPUB creators SHOULD NOT store sensitive user data in + persistent storage. If EPUB creators must store sensitive data, they SHOULD consider encrypting the + data to prevent trivial access to it in the case of an exploit.

+

When publishers and vendors must use digital rights management schemes, they should prefer schemes that do not utilize or transmit information about the user or their content to external parties to perform encryption or decryption.

@@ -11503,6 +11513,9 @@

Change log

>Working Group's issue tracker.