July 26, 2012 TC39 Meeting Notes

David Bruant bruant.d at gmail.com
Sun Sep 23 23:53:42 PDT 2012


Le 23/09/2012 22:04, Herby Vojčík a écrit :
> Hello,
>
> maybe I missed something, but how will you secure the whitelist
> itself? Malicious proxy knowing righteous one can steal its whitelist,
> afaict.
I'm sorry, I don't understand what you're saying here. Can you be more
specific and provide an example of an attack?

As far as I'm concerned, I consider the design secure, because it's
possible to easily write code so that only a proxy (or it's handler to
be more accurate) has access to its whitelist and nothing else.

David
>
> Herby
>
> Tom Van Cutsem wrote:
>> I wrote up a strawman that summarizes the discussion on proxies &
>> private names in this thread:
>> http://wiki.ecmascript.org/doku.php?id=strawman:proxies_names
>>
>> There are still some open issues though.
>>
>> Cheers,
>> Tom
>>
>>
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> es-discuss mailing list
>> es-discuss at mozilla.org
>> https://mail.mozilla.org/listinfo/es-discuss
> _______________________________________________
> es-discuss mailing list
> es-discuss at mozilla.org
> https://mail.mozilla.org/listinfo/es-discuss



More information about the es-discuss mailing list