Apps/Security: Difference between revisions

Jump to navigation Jump to search
m
Line 2: Line 2:
This page is for capturing information about the B2G/OWA security discussion.  
This page is for capturing information about the B2G/OWA security discussion.  
{{note|<b>This is not a design document and should not be considered authoritative at this time</b>}}
{{note|<b>This is not a design document and should not be considered authoritative at this time</b>}}
{{note|<b>This page has been subdivided into sections that have their own page but have been [http://en.wikipedia.org/wiki/Wikipedia:Transclusion transcluded]</b>}}
{{note|<b>This page has been subdivided into sections that have their own page but have been [http://en.wikipedia.org/wiki/Wikipedia:Transclusion transcluded].  If it is easier (less intimidating), each section may be edited as its own page.</b>}}


There are four separate areas where security work is required.  Each area is separate but inter-related.  Each is '''required''' and cannot be ignored.
There are four separate areas where security work is required.  Each area is separate but inter-related.  Each is '''required''' and cannot be ignored.
177

edits

Navigation menu