Hi Bill,

> What about this huge Java security issue?

Please send a link, so we know which one you're talking about.

If you are talking about the series of highly publicized applet
vulnerabilities that have been reported since last fall [1], they only
apply to applets. Running ImageJ as a desktop application, which is what
most of us do, already grants permission for ImageJ to act on your behalf.
In other words, desktop applications typically run with all permissions of
the user (though that is no longer true on mobile platforms, which have
more granular permissions systems).

Note that the exploits being reported work by attackers crafting a special
applet that escapes the Java sandbox to install malware. Running ImageJ as
an applet from a trusted web site poses no issue. You can use a tool such
as NoScript [2] to allow only specific trusted sites such as
imagej.nih.govto run Java applets.

Regards,
Curtis

[1]
http://www.reuters.com/article/2013/01/11/us-java-security-idUSBRE90A0S320130111
[2] http://noscript.net/


On Fri, Jan 11, 2013 at 2:15 PM, Mohler,William <[email protected]>wrote:

>
> Sent from my Verizon Wireless 4G LTE DROID
> _______________________________________________
> ImageJ-devel mailing list
> [email protected]
> http://imagej.net/mailman/listinfo/imagej-devel
>
_______________________________________________
ImageJ-devel mailing list
[email protected]
http://imagej.net/mailman/listinfo/imagej-devel

Reply via email to