On 09/18/2013 12:09 AM, Paul Theriault wrote:
But let me try to rephrase the dilemma here. Currently for 1.2, we have a 
preference ('devtools.debugger.forbid-certified-app') which prevents remote 
debugging  _only_  for certified apps. And I assume that so long as developers 
had the ability to flip this preference, there this is no issue here. In 1.2, 
you need root access to change this preference and debug certified apps - root 
access is non-trivial for regular developers to obtain, so this isn't a great 
situation. In 1.3 we plan to have UI and mechanism to toggle this preference 
this securely (through wiping sensitive user data, or some other solution that 
doesn't impact developer workflow).

So I think the question is really just what to do for the 3 months in between 
the release of 1.2 and 1.3. The argument that I think I am hearing in this 
thread, is that we should switch this preference earlier (i.e. 1.2) because the 
benefit to the ecosystem in terms of ease of development, is greater than the 
risk to our regular users by enabling debugging of certified apps. I don't 
agree with this argument for all the reasons stated above - both from a 
protection of users and potential impact to our reputation. But ultimately this 
needs to be a decision for project leadership, and we need to be loud and clear 
to users about the implications of the decision.

Here are the parts I think we agree on:

Given that access to sensitive data (messages, pictures, and, via email, password resetting) is possible either way on a phone with no passcode set, making the pref false adds only mechanized access to the picture.

Then, features like USB photo sync provide such mechanized access for some sensitive data already. (We don't insist on wiping photos before enabling sync, right?) This further reduces the *additional* (that is, available only by flipping the pref) exposure from allowing debugging.

Is this characterization fair and complete?

Then, I'm not yet persuaded that a user whose phone has been stolen, and who is already worried about in-app access, will further be upset that the debugging protocol offers an additional channel to the thief. I'm not a typical user, but even keeping my limited perspective in mind, that's hard for me to imagine.

I don't even think we should *require* users to wipe sensitive data to enable debugging. We should *offer* to do so, but forcing it seems like building in the assumption that users who are choosing to develop can't consider the consequences of that choice. Is that the way we want to treat people?

_______________________________________________
dev-b2g mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-b2g

Reply via email to