Hello there!
I was testing some WebRTC demos in two separate tabs in Nightly. I realized
I needed to switch from one to another for them to connect faster. I
thought it would be related to Quantum DOM throttling and I was wondering...
- Is it possible that throttling would be affecting DevTool
Congratulations for this 20th issue of the newsletter and for all the hard
work that the Quantum team is doing!
On Fri, Aug 18, 2017 at 7:36 PM, Olli Pettay wrote:
>
>
> On 08/18/2017 08:28 PM, Ehsan Akhgari wrote:
>
>> On Fri, Aug 18, 2017 at 9:39 AM, Ryan VanderMeulen <
>> rvandermeu...@mozill
I strongly encourage you to take a look at the telemetry stats regarding
the usage of deviceorientation API and other. I don't know the penetration
of proximity and ambient light APIs but deviceorientation is definitively
used.
Please, consider twice before taking a final decision.
El 31 jul. 201
the
decision of not switching it off, but neither I thought of reading an image
pixel by pixel with the ambient light sensor, to be honest.
On Wed, Apr 26, 2017 at 8:27 PM, Ehsan Akhgari
wrote:
> On 04/26/2017 11:36 AM, Salvador de la Puente wrote:
>
>> Right, I did not remember that request
will be harmful? Do we have any way to measure
the traffic of the web properties using this API?
On Wed, Apr 26, 2017 at 5:28 PM, Ehsan Akhgari
wrote:
> On 04/25/2017 08:26 PM, Salvador de la Puente wrote:
>
>> So the risk is not that high since if the image is not protected I can
So the risk is not that high since if the image is not protected I can get
it and do evil things without requiring the Light Sensor API. Isn't it?
On Wed, Apr 26, 2017 at 1:30 AM, Eric Rescorla wrote:
>
>
> On Tue, Apr 25, 2017 at 3:40 PM, Salvador de la Puente <
> sde
ks on
> same domain.
>
> On Tue, Apr 25, 2017 at 11:17 PM, Salvador de la Puente <
> sdelapue...@mozilla.com> wrote:
>
>> Sorry for my ignorance but, in the case of Stealing cross-origin
>> resources,
>> I don't get the point of the attack. If have the abili
Sorry for my ignorance but, in the case of Stealing cross-origin resources,
I don't get the point of the attack. If have the ability to embed the image
in step 1, why to not simply send this to evil.com for further processing?
How it is possible for evil.com to get access to protected resources?
O
How does this relate with Project Down and the end of Aurora channel? Will
be multi-e10s enabled when shifting from nightly to beta?
On Wed, Apr 5, 2017 at 1:34 AM, Blake Kaplan wrote:
> Hey all,
>
> We recently enabled 4 content processes by default on Aurora. We're
> still tracking several bug
for users to understand safe browsing.
>>> Safe
>>> Browsing is of course centralized, but that comes with a number of
>>> advantages
>>> and it's not clear what the advantage of decentralized blacklist
>>> dissemination
>>> is, given t
; is, given the networking realities.
>>
>> You posit a mechanism for forming the list of misbehaving sites, but
>> distributed
>> reputation is really hard, and it's not clear that Google is actually
>> doing a bad
>> job of running Safe Browsing, so given that
for a reviewer to lie in
its report and prevent forms of Sybil attack but it seems to be some
solutions out there.
>
> -Ekr
>
>
>
>
>
>
>
> On Tue, Mar 21, 2017 at 2:40 PM, Salvador de la Puente <
> sdelapue...@mozilla.com> wrote:
>
>> Hi Jonathan
>>
Hey,
What would be the advantage of using this over the safesite list? Obviously
there would be less broken sites on the web as we would be permitting the
site to still be viewed by the user rather than just revoking the
permission but are there other advantages?
On Sun, Mar 5, 2017 at 4:23 PM, S
Very interesting stuff. Of course, there are things scaping my
understanding but it is good to know.
Thank you for sharing, Eshang.
El 9 mar. 2017 2:12 p. m., "Ehsan Akhgari"
escribió:
> Hi everyone,
>
> A while ago a number of engineers including myself started to look into a
> performance pro
Hi, folks.
Some time ago, I've started to think about an idea to experiment with new
powerful Web APIs: a sort of "deceptive site" database for harmful uses of
browsers APIs. I've been curating that idea and come up with the concept of
a "revocation protocol" to revoke user granted permissions for
15 matches
Mail list logo