Huh? Didn't think a second about it not being completely obvious that I was making a joke.
I think I'm quite familiar with what is possible and what is not because I spent nearly _your_ complete lifetime on those things :) Norbert Am 04.05.2013 um 12:51 schrieb Benjamin <benjamin.vanryseghem.ph...@gmail.com>: > You really think you can break thing from the Amber browser on client side ? > > Ben > > On May 4, 2013, at 10:33 AM, Norbert Hartl <norb...@hartl.name> wrote: > >> >> >> Am 04.05.2013 um 07:29 schrieb Ben Coman <b...@openinworld.com>: >> >>> Igor Stasenko wrote: >>>> On 4 May 2013 01:01, Javier Pimás <elpochodelage...@gmail.com> wrote: >>>> >>>>> Cool! And I just discovered that typing smalltalk.Browser._open() in the >>>>> javascript console on smalltalkhub site lets you see how the client side >>>>> works. >>>> >>>> Just don't break it please. I need st-hub in working state :) >>> What are the security implications of this ? >>> I guess no more than plain Javascript - the server should not blindly trust >>> what the client sends. >>> >> See! That's a good example why "security by obscurity" does not work. It >> just needs a hacker like Javier to workaround it easily. So Javier has >> control over all of the servers? That's not goo...wait a minute..maybe it is >> good to have another administrator of the site..? Hmmm... >> >> Norbert >