177
edits
| Line 2: | Line 2: | ||
This page is for capturing information about the B2G/OWA security discussion. | This page is for capturing information about the B2G/OWA security discussion. | ||
{{note|<b>This is not a design document and should not be considered authoritative at this time</b>}} | {{note|<b>This is not a design document and should not be considered authoritative at this time</b>}} | ||
{{note|<b>This page has been subdivided into sections that have their own page but have been [http://en.wikipedia.org/wiki/Wikipedia:Transclusion transcluded]</b>}} | {{note|<b>This page has been subdivided into sections that have their own page but have been [http://en.wikipedia.org/wiki/Wikipedia:Transclusion transcluded]. If it is easier (less intimidating), each section may be edited as its own page.</b>}} | ||
There are four separate areas where security work is required. Each area is separate but inter-related. Each is '''required''' and cannot be ignored. | There are four separate areas where security work is required. Each area is separate but inter-related. Each is '''required''' and cannot be ignored. | ||
edits