Kevin Chadwick a écrit :
the system highlighting the
more dangerous ones requested but also maximising user configurability
and overrides is always best
No, you're still dodging the difficult part by providing information to
the user, letting him configure, lalala ...
Take a page form Apple's handbook : make it *just* *work*.
*You* have to tackle the very difficult issue of finding a way so that
it *just* *works*, don't try to pass the buck to the user.
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security