Skip to content

Commit

Permalink
[e] (0) make the intro paragraph easier to understand
Browse files Browse the repository at this point in the history
git-svn-id: http://svn.whatwg.org/webapps@1755 340c8d12-0b0e-0410-8428-c7bf67bfef74
  • Loading branch information
Hixie committed Jun 12, 2008
1 parent 9569624 commit fe3129f
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 4 deletions.
5 changes: 3 additions & 2 deletions index
Expand Up @@ -20600,8 +20600,9 @@ context.getImageData(0, 0, w, h);</pre>
href="#canvas">canvas</a></code> elements</h5>

<p><strong>Information leakage</strong> can occur if scripts from one <a
href="#origin0">origin</a> are exposed to images from another origin (one
that isn't the <a href="#same-origin" title="same origin">same</a>).
href="#origin0">origin</a> can access information (e.g. read pixels) from
images from another origin (one that isn't the <a href="#same-origin"
title="same origin">same</a>).

<p>To mitigate this, <code><a href="#canvas">canvas</a></code> elements are
defined to have a flag indicating whether they are <i>origin-clean</i>.
Expand Down
5 changes: 3 additions & 2 deletions source
Expand Up @@ -18271,8 +18271,9 @@ context.getImageData(0, 0, w, h);</pre>
<h5>Security with <code>canvas</code> elements</h5>

<p><strong>Information leakage</strong> can occur if scripts from
one <span>origin</span> are exposed to images from another origin
(one that isn't the <span title="same origin">same</span>).</p>
one <span>origin</span> can access information (e.g. read pixels)
from images from another origin (one that isn't the <span
title="same origin">same</span>).</p>

<p>To mitigate this, <code>canvas</code> elements are defined to
have a flag indicating whether they are <i>origin-clean</i>. All
Expand Down

0 comments on commit fe3129f

Please sign in to comment.