/srv/irclogs.ubuntu.com/2012/03/17/#ubuntu-us-mi.txt

brouschhttp://yro.slashdot.org/story/12/03/17/0142219/websites-can-detect-what-chrome-extensions-youve-installed10:42
snap-lI'm so glad we chose Javascript for our web language. :)14:01
snap-lI was worried when we decided to move from PHP to other languages that we'd make the web more secure. ;)14:03
rick_hpsh, what security issue is it you've run into?14:20
snap-lSee scrollback from brousch14:20
rick_hthis isn't anything JS related, just how chrome does extensions14:22
jrwreni'm learning things about python that i'd never thought about before.14:27
jrwrenlike from module import name <-- what that ACTUALLY does.14:27
jrwrenits interesting14:27
jrwrenvery C like, very java/c# unlike14:27
jrwrengonna be hard to get a buffer overflow in js :)14:28
rick_hjrwren: heh, import magic!15:58
snap-lrick_h: Yes but the extensions are written in JS, correct?16:01
rick_hsnap-l: right, js and html, but he's reading your manifest.json file, which is required for the extension. So chrome should just prevent access to that file to the running website16:04
snap-lTrue, this is a problem with how Chrome handles extensions16:04
rick_hright, and nothing to do with JS security16:04
rick_h:P16:04
snap-lrick_h: I can see this getting worse before it gets better. :)16:05
snap-lJavascript is extremely powerful and very well integrated into the browser.16:05
greg-gdon't use chrome :)18:16
snap-lGood evenning22:29
rick_hparty23:01
snap-lhttp://blandvargar.bandcamp.com/ <- And this is why I don't play much black metal23:50
snap-lalthough this isn't the worst I've heard.23:50

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!