So that's not a security hole in the browser but a security hole in the head
of the user... that's way different.

Furthermore, the article you are referencing says the same thing - the user
is giving permission to the app to run.  

So what is the issue here? 
Do you want a new security model because you don't like the old one? 
Do you just want the exploits to all be fixed at the same time?  
Do you want a host of new features without paying for it?

I don't think that 1 or 2 are going to happen.  

1 is improbable, 2 is impossible 

So what's the issue?  Just use Firefox.
 
- Matt Small

-----Original Message-----
From: Jochem van Dieten [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, February 16, 2005 11:30 AM
To: CF-Talk
Subject: Re: Internet Explorer 7 (no really!)

Matthew Small wrote:
> That's really a stretch... a security system broken by design?  What's
your
> source on that?

For instance
http://news.com.com/A+question+of+safety/2009-1001_3-208208.html

But one could also point to the browser-OS integration and using 
the browser as delivery mechanism for OS patches. Malware can try 
to access the same hooks and all is needed is tricking the user 
into clicking Yes once.

Jochem


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:195004
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to