Editing Talk:Extras-testing/QA checklist

Warning: You are not logged in. Your IP address will be recorded in this page's edit history.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 13: Line 13:
** The trick is to know when it's "without a reason" or even if it's the app who is creating the connection or something else. In any case these random or unrequested connections can be cause of a bug and might have an impact in power management and even financial loss, so it's good to ask about them.--[[User:qgil|qgil]] 11:11, 23 October 2009 (UTC)
** The trick is to know when it's "without a reason" or even if it's the app who is creating the connection or something else. In any case these random or unrequested connections can be cause of a bug and might have an impact in power management and even financial loss, so it's good to ask about them.--[[User:qgil|qgil]] 11:11, 23 October 2009 (UTC)
-
* I'd rephrase "MUST NOT contain known security vulnerabilities" and "MUST specify a security vulnerability reporting contact point".
+
* I'd rephrase "MUST NOT contain known security vulnerabilities" and
-
** This would take the ambiguity out of a security *risk* (almost nothing is risk-free). Vulnerabilities, however, are more tangible. There is, of course, still a class of vulnerabilities that could result in a debate, but much less so than when talking about risk.
+
"MUST specify a security vulnerability reporting contact point".
-
** "Known" is also tricky - known by whom? - but it could suffice, as if anyone who is actually involved in this QA checking "knows", it would trigger this.
+
** This would take the ambiguity out of a security *risk* (almost nothing
-
** The contact point would usually be an email address and perhaps an associated GPG key, but the bug tracker could also suffice if the project is really keen on full disclosure. --[[User:avs|avs]] 18:30, 28 October 2009 (UTC)
+
is risk-free). Vulnerabilities, however, are more tangible. There is,
 +
of course, still a class of vulnerabilities that could result in a
 +
debate, but much less so than when talking about risk.
 +
** "Known" is also tricky - known by whom? - but it could suffice, as if
 +
anyone who is actually involved in this QA checking "knows", it would
 +
trigger this.
 +
** The contact point would usually be an email address and perhaps an
 +
associated GPG key, but the bug tracker could also suffice if the
 +
project is really keen on full disclosure. --[[User:avs|avs]] 18:30, 28 October 2009 (UTC)
== Qt ==
== Qt ==

Learn more about Contributing to the wiki.


Please note that all contributions to maemo.org wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see maemo.org wiki:Copyrights for details). Do not submit copyrighted work without permission!


Cancel | Editing help (opens in new window)