B2G App Security Model: Difference between revisions

m
no edit summary
mNo edit summary
mNo edit summary
Line 17: Line 17:
How should apps with "special" privileges be managed (identified, discovered, installed, updated)?  Do they require a different security model?
How should apps with "special" privileges be managed (identified, discovered, installed, updated)?  Do they require a different security model?


What restrictions should exist for code and content importing for apps?
What restrictions should exist for code and content importing for apps (remote to local, cross-domain)?


Which types of applications need to be signed? (if so how, and what will be signed?)
Which types of applications need to be signed? (if so how, and what will be signed?)
Confirmed users
717

edits