-
The reduction of user interaction by automating the sending
of additional requests.
-
The provision of a personalised representation that matches
the capabilities of the user agent.
|
-
The need for multiple requests to build the final
representation.
-
The introduction of potential threats due to script
execution, e.g. a man-in-the-middle attacker can intercept
or rewrite the response to include malicious JavaScript
code. Malicious active content can steal the user's
credentials, acquire sensitive data about the user, or
attempt to install malware on the user's system (by
leveraging vulnerabilities in the browser or its plugins,
for example).
-
The prohibition of active content by default in the most
recent versions of browsers due to the vulnerabilities
mentioned above.
|