Thanks for the reply Alexey. That's what I thought the answer might be, just wanted to check to see if any security mechanism was implemented that I wasn't aware of.
Thanks, Dean Alexey Proskuryakov-4 wrote: > > > 13.03.2009, в 22:09, dean.mikel написал(а): > >> Would it be possible for a malicious native app to break into the >> application cache, replacing some or all of my stored javascript or >> gain access to my db? Thanks. > > > Both offline application cache and HTML5 SQL storage can be easily > manipulated by native applications (of course, in a totally > unsupported and fragile manner). > > That said, a native application can also access the data in RAM as it > is processed by Safari. > > - WBR, Alexey Proskuryakov > > > _______________________________________________ > webkit-dev mailing list > [email protected] > http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev > > -- View this message in context: http://www.nabble.com/Is-the-HTML5-application-cache-secure--tp22501436p22509610.html Sent from the Webkit mailing list archive at Nabble.com. _______________________________________________ webkit-dev mailing list [email protected] http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev

