4.1 Security Considerations for Implementers

Because the encapsulation algorithm involves parsing and evaluating content that is not created by the algorithm, there is an opportunity for non-valid or malicious content to be provided. Therefore, it is recommended that implementers take all necessary precautions to protect other systems. For example, a linked HTML stylesheet (which would create a better HTML rendering of the document) might not be loaded due to security concerns with accessing the network to retrieve non-local data. In this case, a default font face and size might be chosen during the conversion process.

The encapsulation process could encapsulate carefully crafted arbitrary binary content other than valid HTML or plain text. Ensuring that such content is not accidentally and automatically interpreted as executable code or script is imperative.