Hello there!
I was testing some WebRTC demos in two separate tabs in Nightly. I realized
I needed to switch from one to another for them to connect faster. I
thought it would be related to Quantum DOM throttling and I was wondering...
- Is it possible that throttling would be affecting
Congratulations for this 20th issue of the newsletter and for all the hard
work that the Quantum team is doing!
On Fri, Aug 18, 2017 at 7:36 PM, Olli Pettay wrote:
>
>
> On 08/18/2017 08:28 PM, Ehsan Akhgari wrote:
>
>> On Fri, Aug 18, 2017 at 9:39 AM, Ryan VanderMeulen <
I strongly encourage you to take a look at the telemetry stats regarding
the usage of deviceorientation API and other. I don't know the penetration
of proximity and ambient light APIs but deviceorientation is definitively
used.
Please, consider twice before taking a final decision.
El 31 jul.
e
decision of not switching it off, but neither I thought of reading an image
pixel by pixel with the ambient light sensor, to be honest.
On Wed, Apr 26, 2017 at 8:27 PM, Ehsan Akhgari <ehsan.akhg...@gmail.com>
wrote:
> On 04/26/2017 11:36 AM, Salvador de la Puente wrote:
>
>> Right, I d
will be harmful? Do we have any way to measure
the traffic of the web properties using this API?
On Wed, Apr 26, 2017 at 5:28 PM, Ehsan Akhgari <ehsan.akhg...@gmail.com>
wrote:
> On 04/25/2017 08:26 PM, Salvador de la Puente wrote:
>
>> So the risk is not that high since if the image
So the risk is not that high since if the image is not protected I can get
it and do evil things without requiring the Light Sensor API. Isn't it?
On Wed, Apr 26, 2017 at 1:30 AM, Eric Rescorla <e...@rtfm.com> wrote:
>
>
> On Tue, Apr 25, 2017 at 3:40 PM, Salvador de la Puen
, that and history attacks on
> same domain.
>
> On Tue, Apr 25, 2017 at 11:17 PM, Salvador de la Puente <
> sdelapue...@mozilla.com> wrote:
>
>> Sorry for my ignorance but, in the case of Stealing cross-origin
>> resources,
>> I don't get the point of the attac
Sorry for my ignorance but, in the case of Stealing cross-origin resources,
I don't get the point of the attack. If have the ability to embed the image
in step 1, why to not simply send this to evil.com for further processing?
How it is possible for evil.com to get access to protected resources?
How does this relate with Project Down and the end of Aurora channel? Will
be multi-e10s enabled when shifting from nightly to beta?
On Wed, Apr 5, 2017 at 1:34 AM, Blake Kaplan wrote:
> Hey all,
>
> We recently enabled 4 content processes by default on Aurora. We're
> still
o understand safe browsing.
>>> Safe
>>> Browsing is of course centralized, but that comes with a number of
>>> advantages
>>> and it's not clear what the advantage of decentralized blacklist
>>> dissemination
>>> is, given the networking re
en the networking realities.
>>
>> You posit a mechanism for forming the list of misbehaving sites, but
>> distributed
>> reputation is really hard, and it's not clear that Google is actually
>> doing a bad
>> job of running Safe Browsing, so given that this is a
rt and prevent forms of Sybil attack but it seems to be some
solutions out there.
>
> -Ekr
>
>
>
>
>
>
>
> On Tue, Mar 21, 2017 at 2:40 PM, Salvador de la Puente <
> sdelapue...@mozilla.com> wrote:
>
>> Hi Jonathan
>>
>> In the short an
Sun, Mar 5, 2017 at 4:23 PM, Salvador de la Puente <
sdelapue...@mozilla.com> wrote:
> Hi, folks.
>
> Some time ago, I've started to think about an idea to experiment with new
> powerful Web APIs: a sort of "deceptive site" database for harmful uses of
> browsers
Very interesting stuff. Of course, there are things scaping my
understanding but it is good to know.
Thank you for sharing, Eshang.
El 9 mar. 2017 2:12 p. m., "Ehsan Akhgari"
escribió:
> Hi everyone,
>
> A while ago a number of engineers including myself started to
Hi, folks.
Some time ago, I've started to think about an idea to experiment with new
powerful Web APIs: a sort of "deceptive site" database for harmful uses of
browsers APIs. I've been curating that idea and come up with the concept of
a "revocation protocol" to revoke user granted permissions
15 matches
Mail list logo