diff --git a/signature-based-restrictions-explainer.markdown b/signature-based-restrictions-explainer.markdown index 2f75d54..d520e35 100644 --- a/signature-based-restrictions-explainer.markdown +++ b/signature-based-restrictions-explainer.markdown @@ -1,153 +1 @@ -# Explainer: Signature-based Resource Loading Restrictions - -## The Problem - -Developers wish to have fine-grained control over the resources loaded into their pages in order -to mitigate the risk that malicious resources will be loaded. They have a few options to do so at -the moment: - -* [Content Security Policy][CSP] provides URL-based confinement via [host-source][] expressions, - allowing developers to restrict themselves to known-good sources. For example, the policy - "`script-src https://example.com/script/trusted.js`" ensures that script executes only when it's - loaded from the specified URL. - -* [Subresource Integrity][SRI] allows developers to ensure that a script will execute only - if it contains known-good content. For example, the user agent ensures that script loaded via - "`