| Deutsch English Français Italiano |
|
<jwvo78chl7o.fsf-monnier+comp.arch@gnu.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Stefan Monnier <monnier@iro.umontreal.ca>
Newsgroups: comp.arch
Subject: Re: Byte Addressability And Beyond
Date: Fri, 07 Jun 2024 10:48:56 -0400
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <jwvo78chl7o.fsf-monnier+comp.arch@gnu.org>
References: <v0s17o$2okf4$2@dont-email.me> <v34v62$ln01$1@dont-email.me>
<v36bva$10k3v$2@dont-email.me>
<2024May29.090435@mips.complang.tuwien.ac.at>
<v38opv$1gsj2$3@dont-email.me> <v38rkd$1ha8a$1@dont-email.me>
<jwvttifrysb.fsf-monnier+comp.arch@gnu.org>
<f90b6e03c727b0f209d64484ec097298@www.novabbs.org>
<v3jtd8$3qduu$2@dont-email.me> <20240603132227.00004e0f@yahoo.com>
<k6k7O.8602$7jpd.5620@fx47.iad> <v3klhp$3ugeh$1@dont-email.me>
<v3mljt$c63k$1@dont-email.me> <v3nf7j$gesm$1@dont-email.me>
<v3padn$the9$1@dont-email.me> <v3pph1$1010d$1@dont-email.me>
<20240605164905.000054da@yahoo.com> <v3q310$11ij4$1@dont-email.me>
<20240605200643.000059be@yahoo.com>
<jwv4ja7jnsk.fsf-monnier+comp.arch@gnu.org>
<v3tv8p$1tm1m$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 07 Jun 2024 16:48:59 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="67c013ba2fe946eeae78916e1f0b4490";
logging-data="2224510"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18EPzA1dBSNJenNadU/ZnG9og6DD47v2TQ="
User-Agent: Gnus/5.13 (Gnus v5.13)
Cancel-Lock: sha1:kQxtSY2RPnMddtFK7bv5yPU8IPM=
sha1:Jx9Qy+QzAkwzrcSS5p/E//mnVZQ=
Bytes: 2389
>> ... every day that comes by, another activity is made virtually
>> impossible without allowing such arbitrary code on your device. 🙁
> If you’re talking about WASM or JavaScript from websites, that runs in a
> carefully-designed sandbox.
The sandbox gives you only a very crude amount of control.
In practice it's still basically code over which you have no control
(beside "do I run it or not").
And your sandbox wants to provides access to a large part of your
machine's hardware anyway, in order to be able to run the many "web
applications". So, it comes with many "carefully-designed" holes.
And that's without counting hardware and software bugs.
Stefan