World: r3wp
[Plugin-2] Browser Plugins
older newer | first last |
Volker 15-Jun-2006 [1131] | although some storage for graphics-heavy things would be nice. |
Pekr 15-Jun-2006 [1132] | Brain - are you suggesting so tight security for us rebollers only, or do also other plug-ins use such limited environment? (although I am starting to understand, that there should be NO way of how to harm your computer, or it will be regarded - unsecure) |
BrianH 15-Jun-2006 [1133x2] | I don't want there to be any need for people to make a REBOL-blocker like FlashBlock or NoScript. |
(both of which I use, btw) | |
Volker 15-Jun-2006 [1135] | i would not go oncrypto only but also on "allow website", like noscript |
BrianH 15-Jun-2006 [1136] | Yes, we need better security requestors too. |
Volker 15-Jun-2006 [1137x2] | yes, and remembering such things. maybe asking on start to allow access to last session. if denied sandbox is cleared. |
that is one extra click | |
BrianH 15-Jun-2006 [1139x2] | Volker, I agree that some graphics-heavy scripts could use local storage. Those scripts could easily be signed though. |
There should also be a way to provide access to the browser's objects. The browser already caches those, and that cache is managed by code that the user is already trusting. | |
Volker 15-Jun-2006 [1141x2] | signing needs keys. then we need a free registry if we want all the newcomers to have fun. |
and allowing access based on url is IMHO the most natural way. | |
BrianH 15-Jun-2006 [1143] | Actually, there is a lot that you can do even within those restrictions. Just look at Flash. |
Volker 15-Jun-2006 [1144x3] | but there could be done more :) |
speciallly when things start. later onecan optimize, but thefirst protoype-bitmaps can be large. | |
and if you cancel "reuse last session" and check "forever" you are pretty much anonymous. | |
BrianH 15-Jun-2006 [1147] | Well then, the question you should consider when thinking about newbies is this: What would you let your worst enemy do with your computer? This is the web. We aren't talking about saints here - we are talking about people who use baner ads to install spyware. |
Volker 15-Jun-2006 [1148] | I did ask. cant see doors for banner-adds nor spyware. |
BrianH 15-Jun-2006 [1149] | Banner ads are on web pages. You can make banner ads with Flash, and that is less dangerous than the current plugin. |
Volker 15-Jun-2006 [1150x2] | files are a risk to privacy if they cant be blocked. that reuse-question does this. and they can be prepared to be run, eg called *.exe and hoping the user some day clicks on them. so i suggest a wrapper, maybe store everything as rebol[]#{stuff} or in a single zip or something. |
i thought we talk about local storage. what has that to do with banner-addds? | |
Pekr 15-Jun-2006 [1152] | wouldn't e.g. local storage limited to say 20 MB be sufficient "security"? Hmm, should read that Flash security doc first probably :-) |
BrianH 15-Jun-2006 [1153x2] | As I've mentioned here before, there many nasty things you can do with the present plugin and I don't want to make suggestions on a web-public group. Go private if you want some ideas - I trust you not to misuse them. |
I read the Flash security doc, and it has many good ideas. I'm still a little iffy about it providing cookies to anonymous scripts without providing a management interface - that's why I still use FlashBlock. | |
Pekr 15-Jun-2006 [1155] | how can cookie harm you? |
BrianH 15-Jun-2006 [1156x2] | I mean Flash cookies - browser cookies do have a management interface. |
Cookies can be used to track your movements, and can be used as persistent distributed storage. | |
Pekr 15-Jun-2006 [1158] | I trust you gurus for proper security concerns, however let's not forget us - the end users, where over complication does not work. Even Vista is being reduced in such regard - way too many obtrusive security requestors to users. In other words, - don't bother end user with questions he knows sh*t about their meaning anyway:-) |
BrianH 15-Jun-2006 [1159] | Imagine if Google used the plugin for their ads - they would be able to store their whole database distributed amongst the computers of everyone on the internet. Would a security requestor be able to explain that to a newbie? |
Pekr 15-Jun-2006 [1160] | no |
BrianH 15-Jun-2006 [1161] | The advantage to cryptographic signing isn't just being able to track down an author, it also allows certificate revocation. With a free registry, revocation wouldn't matter - the bad guys would just register again. |
Pekr 15-Jun-2006 [1162] | askiing user e.g. what you discussed here - "do you want your previous cache to be deleted?" would result to "What is cache?" in 99% and users would press "Yes" .... or "no" .... :-) |
BrianH 15-Jun-2006 [1163] | This is why it would be best to use the browser cache for "let me store some graphics so I won't have to download them every time" situations. Other user settings are small in comparison, and can easily be stored in browser cookies or server side. Then, no security requestors necessary. |
Pekr 15-Jun-2006 [1164x2] | then we need to investigate ways of how to better utilise do-browser ... |
are we able to get to such browser settings in some unified way, so the same script works in all browsers? | |
BrianH 15-Jun-2006 [1166x2] | You could write *-thru functions that used the browser to do the reading, with its cache. |
read-thru, load-thru, etc., just like View uses for its sandbox. | |
Pekr 15-Jun-2006 [1168] | hmm, that needs to be part of our user code. Not sure Carl will want to have two different versions of mezzanines - View, and plug-in one ... |
BrianH 15-Jun-2006 [1169] | There are two dlls here you know, the plugin calls the View dll. The browser-specific stuff is in the different plugin dlls. |
Pekr 15-Jun-2006 [1170] | my understanding is that it is the C code, wrapper for the browser. It would have to call View dll with some packed-in rebol code then to "preconfigure/patch" some mezzanine code ... |
BrianH 15-Jun-2006 [1171x3] | Sure. Not hard at all - I expect it must do something similar to mak do-browser available. |
You could probably implement port schemes for cookies:// and cache:// right now using mezzanine code wrapped around do-browser that would do the trick quite nicely. Then, all you would need to do is assign cache:// to view-root and the existing functions would work. | |
Which brings to mind a question: What JavaScript types get converted to REBOL types when returned by do-browser? | |
Allen 15-Jun-2006 [1174x2] | Doesn't url based security limit the ability to do clientside mashups from multiple services? |
One of the attractions for having a smart client in the browser means I can distribute tasks to it, instead of the server. But I url based security is a dampener on that. It's the reason why flash has stumbled, as javascript based mashups flourish | |
Volker 15-Jun-2006 [1176x3] | That limiting is the idea. Allowing someone to mashup with some code from your bank -accaount is not the best idea. As feature yes, but unknown and as default? |
Brian, where is the difference between a browser-cache and a selfmade one? | |
And i was discussing plugin2, not the way the sandbox works now. | |
BrianH 15-Jun-2006 [1179] | Allen, do you mean clientside mashups like these?: - DDOS zombies - Spam relays - P2P relays - Anonymous proxies So, which of these do you want a webbug written in REBOL or Flash to be able to do? |
Graham 15-Jun-2006 [1180] | p2p relay |
older newer | first last |