zlacker

[parent] [thread] 4 comments
1. pauldd+(OP)[view] [source] 2023-05-25 02:54:16
Yes and....
replies(1): >>EvanAn+pr1
2. EvanAn+pr1[view] [source] 2023-05-25 15:38:24
>>pauldd+(OP)
Visiting a website and running Javascript vs. running a native application aren't equivalent. Browser sandbox exploits are "a thing" but that doesn't make the situations the same.
replies(1): >>pauldd+eL1
◧◩
3. pauldd+eL1[view] [source] [discussion] 2023-05-25 17:13:17
>>EvanAn+pr1
Yes and WASM can be sandboxed just as easily as JavaScript.

There is nothing "magical" about web browsers in that regard.

replies(1): >>EvanAn+fT1
◧◩◪
4. EvanAn+fT1[view] [source] [discussion] 2023-05-25 17:54:09
>>pauldd+eL1
I don’t follow where you’re going.

I didn’t say there was anything “magical” about browsers. They have a sandbox for JavaScript, by default. Windows doesn’t have a sandbox for native apps, by default.

A parent poster seemed to be making a statement of equivalency between running a native application in Windows and running JavaScript in a browser. I don’t think they’re equivalent.

That’s what I’m saying.

replies(1): >>iknows+bN2
◧◩◪◨
5. iknows+bN2[view] [source] [discussion] 2023-05-25 22:40:15
>>EvanAn+fT1
We are literally talking about an environment for running Win32 apps in a sandbox
[go to top]