From e3a0733122b2d23596a8659cc32657f4dde05ffb Mon Sep 17 00:00:00 2001 From: Mike West Date: Thu, 10 Oct 2024 10:26:51 +0200 Subject: [PATCH] Update signature-based-restrictions-explainer.markdown (#127) Closes https://github.com/mikewest/signature-based-sri/issues/6. --- ...ture-based-restrictions-explainer.markdown | 154 +----------------- 1 file changed, 1 insertion(+), 153 deletions(-) diff --git a/signature-based-restrictions-explainer.markdown b/signature-based-restrictions-explainer.markdown index 2f75d54..d520e35 100644 --- a/signature-based-restrictions-explainer.markdown +++ b/signature-based-restrictions-explainer.markdown @@ -1,153 +1 @@ -# Explainer: Signature-based Resource Loading Restrictions - -## The Problem - -Developers wish to have fine-grained control over the resources loaded into their pages in order -to mitigate the risk that malicious resources will be loaded. They have a few options to do so at -the moment: - -* [Content Security Policy][CSP] provides URL-based confinement via [host-source][] expressions, - allowing developers to restrict themselves to known-good sources. For example, the policy - "`script-src https://example.com/script/trusted.js`" ensures that script executes only when it's - loaded from the specified URL. - -* [Subresource Integrity][SRI] allows developers to ensure that a script will execute only - if it contains known-good content. For example, the user agent ensures that script loaded via - "`