Hi,
I must clarify that the assumption regarding rate-limiting workarounds is incorrect. While services like Cloudflare or Let's Encrypt may rely on the PSL, my request is driven by the fundamental technical and security requirements I outlined above (such as cookie-jar isolation and cross-site security), which are the core purposes of this list.
It is disappointing to see a legitimate infrastructure request dismissed based on a previous interaction. Judging a project’s current technical merit based on a past 'bad request' by a former team member is not aligned with the professional standards of a project as critical as the PSL.
We are seeking a fair technical evaluation based on our current compliance with the guidelines. We believe our architecture meets the criteria for inclusion, and we are prepared to take the necessary formal steps to ensure our project is not unfairly excluded due to a misunderstanding of our objectives.
Hi,
I must clarify that the assumption regarding rate-limiting workarounds is incorrect. While services like Cloudflare or Let's Encrypt may rely on the PSL, my request is driven by the fundamental technical and security requirements I outlined above (such as cookie-jar isolation and cross-site security), which are the core purposes of this list.
It is disappointing to see a legitimate infrastructure request dismissed based on a previous interaction. Judging a project’s current technical merit based on a past 'bad request' by a former team member is not aligned with the professional standards of a project as critical as the PSL.
We are seeking a fair technical evaluation based on our current compliance with the guidelines. We believe our architecture meets the criteria for inclusion, and we are prepared to take the necessary formal steps to ensure our project is not unfairly excluded due to a misunderstanding of our objectives.