Conversation

Replying to
They made it because Cairo has terrible performance and varying output across platforms. I'd expect that Cairo has bigger security problems too, but doesn't get nearly as much attention because it's not exposed in two of the major browsers as the 2D canvas implementation.
3
2
Replying to
Font handling is also a large attack surface since font rendering is extremely complex and browsers expose it to untrusted input by supporting fonts provided by the site. CSS is super complex by itself and keeps getting more features that need to interact with all the others.
2
2
Replying to and
There's literally a browser API which supports updating firmware on devices which mostly have no signature verification for the updates. The manufacturers consider that an important feature, even including the fact that there's no signature verification.
1
2
Replying to and
They don't want to deal with supporting updates and modding securely, so they expose firmware updates via an API exposed through web browsers and leave out verifying the updates. A user allowing access ends up letting a site implant it with persistent malware without any exploit.
1
Replying to
These devices have a fair bit of attack surface and probably do need security updates though, and people wouldn't do it that way. It really needs signature verification and should check the origin of the update too along with requiring explicit consent to do it though.
1
Replying to
I think that's what Mozilla was proposing they are going to do, but there's a lot of push back from the users and device vendors because there's so much non-standard functionality. They seem to care a lot about allowing random sites to overwrite the firmware too... it's scary.
1
Show replies
Replying to and
Using a hard-wired key by default and supporting a way to flash a custom one with physical access is something they could do, but I get the impression they explicitly don't want to do that even if they could magically have a good implementation for free.