The distinction between applets and apps is a valid one, but I am not
sure that it is dichotomous here.

The crucial piece of information for a would-be villain is that a
particular security vulnerability exists (because a particular breach
has occurred); and on this occasion more than enough information about
the locus of the vulnerability within Java is already available.

I shall be surprised if some toxic Java apps do not make their
appearance very soon now.

John Gilmore, Ashland, MA 01721 - USA

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to