Huh? Didn't think a second about it not being completely obvious that I was 
making a joke. 

I think I'm quite familiar with what is possible and what is not because I 
spent nearly _your_ complete lifetime on those things :)

Norbert

Am 04.05.2013 um 12:51 schrieb Benjamin <benjamin.vanryseghem.ph...@gmail.com>:

> You really think you can break thing from the Amber browser on client side ?
> 
> Ben
> 
> On May 4, 2013, at 10:33 AM, Norbert Hartl <norb...@hartl.name> wrote:
> 
>> 
>> 
>> Am 04.05.2013 um 07:29 schrieb Ben Coman <b...@openinworld.com>:
>> 
>>> Igor Stasenko wrote:
>>>> On 4 May 2013 01:01, Javier Pimás <elpochodelage...@gmail.com> wrote:
>>>> 
>>>>> Cool! And I just discovered that typing smalltalk.Browser._open() in the
>>>>> javascript console on smalltalkhub site lets you see how the client side
>>>>> works.
>>>> 
>>>> Just don't break it please. I need st-hub in working state :)
>>> What are the security implications of this ?
>>> I guess no more than plain Javascript - the server should not blindly trust 
>>> what the client sends.
>>> 
>> See! That's a good example why "security by obscurity" does not work. It 
>> just needs a hacker like Javier to workaround it easily. So Javier has 
>> control over all of the servers? That's not goo...wait a minute..maybe it is 
>> good to have another administrator of the site..? Hmmm...
>> 
>> Norbert
> 

Reply via email to