Jim Witte wrote:
I just went to Unsanity's "Paranoid Android" page where they have a couple examples of the URI exploit and tried to run them in Camino. The disks (via dmg I think and ftp mounted), but then Camino refused to run the URI supposedly registered by the Info.plist file (message came up 'malware:// is not a registered protocol'). I do have More Internet installed, which might be what prevented it. If not, does this mean that Camino is safe from the exploit?
More Internet can't protect against the arbitrary URI exploit, and Camino is not safe from it (although I believe that there was a recent change to the Moz code which blocks the disk:// URI, making recent nightlies safe). Probably the page was just too fast in its redirect, so the malware handler hadn't been registered. Try reloading the page, as their instructions say, and you should see the full exploit.
-Stuart Morgan _______________________________________________ Camino mailing list [EMAIL PROTECTED] http://mozdev.org/mailman/listinfo/camino
