[536] in cryptography@c2.net mail archive
Re: SSL weakness affecting links from pa
daemon@ATHENA.MIT.EDU (Bryce)
Mon Apr 14 16:10:56 1997
To: Black Unicorn <unicorn@schloss.li>
cc: Tom Weinstein <tomw@netscape.com>, toto@sk.sympatico.ca,
Bill Stewart <stewarts@ix.netcom.com>,
ARTURO GRAPA YSUNZA <AGRAPA@banamex.com>,
"Mark M." <markm@voicenet.com>,
"cypherpunks@toad.com" <cypherpunks@toad.com>,
"cryptography@c2.net" <cryptography@c2.net>
Reply-To: bryce@digicash.com
In-reply-to: Your message of "Mon, 14 Apr 1997 12:14:47 EDT."
<Pine.SUN.3.96.970414115216.28199C-100000@polaris.mindport.net>
Date: Mon, 14 Apr 1997 20:34:08 +0200
From: Bryce <bryce@digicash.com>
A million monkeys operating under the pseudonym
"Black Unicorn <unicorn@schloss.li>" typed:
>
> "You are about to forward a referer header to the page you have selected.
> Forwarding the referer header to this site may reveal more about your web
> browsing habits than you would prefer. Should <netscape> surpress the
> referer header? Yes/No/Always Surpress/Never Surpress."
Minor UI nit: it would be much much better if it said
"You are about to send a 'referrer header' telling the next web
site about the web page you are currently looking at. Should
<netscape> send this 'referrer header'?
[Yes/No/Always Send Referrer Headers/Never Send Referrer Headers]"
Regards,
Zooko Journeyman
Disclaimers follow: I am not a cypherpunk. NOT speaking for
DigiCash or any other person or organization. No PGP sig follows.