G'day @we1x, I'd love to hear your thoughts on our use of CSP and COOP to sandbox and isolate user created apps on hash based subdomains in @peergos There's an overview here: https://peergos.org/posts/a-better-web but I'd love to talk if you're interested.
@ianopolous @peergos Hi Ian, this is an interesting proposal. CSP can usually not prevent exfiltration of data once untrusted/malicious scripts can be executed in the origin where the sensitive data lives. For example CSP does not restrict navigation and therefore navigating a site (or opening a new window) can be used to exfiltrate data. E.g. navigating to example.com?x=some-data.
However, I don't know your setup so my comment may or may not be accurate here.
You can find more examples on slide 25 here: https://conference.hitb.org/hitbsecconf2018ams/materials/D2T2%20-%20Michele%20Spagnuolo%20&%20Lukas%20Weichselbaum%20-%20Defense-in-Depth%20Techniques%20for%20Modern%20Web%20Applications%20and%20Google%E2%80%99s%20Journey%20with%20CSP.pdf