Skip to content
By using Twitter’s services you agree to our Cookies Use. We and our partners operate globally and use cookies, including for analytics, personalisation, and ads.
  • Home Home Home, current page.
  • About

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English UK
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log in
    Have an account?
    · Forgot password?

    New to Twitter?
    Sign up
slightlylate's profile
Alex Russell
Alex Russell
Alex Russell
@slightlylate

Tweets

Alex Russell

@slightlylate

Chrome Project 🐡 & Web Standards TL; Blink API OWNER Named PWAs w/ @phae; probably making her ☕ DMs open. Tweets my own; press@google.com for official comms.

San Francisco, The Internet
infrequently.org
Joined December 2010

Tweets

  • © 2020 Twitter
  • About
  • Help Center
  • Terms
  • Privacy policy
  • Imprint
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgot password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log in »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not working for you?

    Hover over the profile pic and click the Following button to unfollow any account.

    Say a lot with a little

    When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.

    Learn the latest

    Get instant insight into what people are talking about now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    1. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      Alex Russell Retweeted Thomas Steiner

      To clarify for non-tech folk: TL;DR, there's a silent browser war afoot -- a tug-of-war between apps and real browsers. Some apps use technology designed to show in-app content to render (unsafe) out-of-app content. This endangers privacy, but also hurts the web.https://twitter.com/tomayac/status/1105053795917225985 …

      Alex Russell added,

      Thomas Steiner @tomayac
      To add some context to @slightlylate’s quoted tweet ⤵️: the issue is the `shouldInterceptRequest` method ( https://developer.android.com/reference/android/webkit/WebViewClient.html#shouldInterceptRequest(android.webkit.WebView,%20android.webkit.WebResourceRequest) …) that essentially allows any app to intercept (MITM) and rewrite traffic, even if loaded over HTTPS. Use ChromeCustomTabs, folks! Distrust WebView! https://twitter.com/slightlylate/status/1104964835362529283 …
      12 replies 55 retweets 128 likes
      Show this thread
    2. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      I say "silent" because the UI presented by real browsers via Chrome Custom Tabs (CCT) and legacy "in-app browsers" based on WebView is often hard to spot: https://developer.chrome.com/multidevice/android/customtabs …

      1 reply 2 retweets 5 likes
      Show this thread
    3. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      To see which approach an app is taking, click on a link that doesn't take you "all the way out" to a browser and look for the 3-dot menu (or equivalent). If it has a "Powered by <Browser>" item at the bottom of the menu, it's CCT: https://developer.chrome.com/multidevice/images/customtab/twitter_menu.png …

      1 reply 4 retweets 8 likes
      Show this thread
    4. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      If you *don't* see that, you're dealing with a WebView -- which is the app doing a *very bad thing*. What's the difference? Buckle up, this gets slightly technical. WebView is a system component of Android. These days, it auto-updates, but didn't always do so.

      1 reply 4 retweets 10 likes
      Show this thread
    5. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      WebViews were designed for loading content *from the app* into the app. That is, stuff it trusts. The threat model both from security and privacy is pretty straightforward. Things get funky when you load stuff from other parties.

      2 replies 2 retweets 8 likes
      Show this thread
    6. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      Browsers, on the other hand, are designed to update outside the OS update cycle and fundamentally mistrust content -- they're the *user's* agent, rather than an app component.

      1 reply 1 retweet 9 likes
      Show this thread
    7. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      This difference runs deep, but the most important thing to understand is that users choose browsers. That's an intentional preference that should mean something.

      1 reply 1 retweet 10 likes
      Show this thread
    8. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      When apps use CCT to load third-party content, they are _respecting user choice_. But they're also practicing security hygiene and acting as good web citizens. Why? First, WebView puts the problem of loading content onto the app. This means that apps *incidentally* see plaintext

      1 reply 1 retweet 5 likes
      Show this thread
    9. Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      CCT invocation, on the other hand, delegates this problem to the user's default browser. And browsers spend a _lot_ of time and effort getting transport security and UI indicators about safety right. Now, OS vendors realized that this was happening and have responded (a bit).

      2 replies 1 retweet 9 likes
      Show this thread
      Alex Russell‏ @slightlylate 11 Mar 2019
      • Report Tweet
      • Report NetzDG Violation

      Modern WebView on Android is powered by an auto-updating Chrome. But that still leaves ~8% of devices without up-to-date WebView runtimes:https://developer.android.com/about/dashboards/ …

      9:56 AM - 11 Mar 2019
      • 2 Retweets
      • 7 Likes
      • Brandon Long Israel Muñoz jameschurchman Rhy Moore Kathryn Killebrew pay essential workers like they’re essential Deirdre Connolly¹ 💖 Taudry Hepburn 💖
      1 reply 2 retweets 7 likes
        1. New conversation
        2. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          ...for context, that's almost half the number of people with iPhones. The scale of Android is mind-boggling. But even with auto-updating WebView handling (some of) the security aspects, the privacy issue remains. WebViews aren't browsers.

          1 reply 1 retweet 10 likes
          Show this thread
        3. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          Installing a different browser as your default on the system doesn't change the app's WebView implementation. Sure, they can bring their own (super common in CN), but user choice and privacy is undermined. The app *still gets to see everything you do in the WebView*.

          4 replies 2 retweets 10 likes
          Show this thread
        4. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          ...every keystroke you type, every password you enter, every site you go to in that session. You're now trusting the parent app with *everything*. You installed Brave or Samsung Internet or Opera or FF as your default browser? Tough. In-app, WebView-based browsers DGAF.

          2 replies 3 retweets 14 likes
          Show this thread
        5. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          ...whereas CCT puts your browsing back in your hands. With CCT, your choices matter, and bowsers can compete on security/privacy/tracking/etc.

          2 replies 2 retweets 11 likes
          Show this thread
        6. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          There's a further issue, though. WebViews aren't meant to be full implementations of the web platform. They're sort of halflings: some core stuff is built-in, but anything that reaches outside of the renderer -- APIs that do something other than CSS/HTML/JS -- is often busted.

          1 reply 1 retweet 6 likes
          Show this thread
        7. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          This makes WebView based in-app "browsers" totally broken from the perspective of the web platform. They are boat-anchors for progress on the web, even when they're built form exactly the same source code.

          2 replies 1 retweet 11 likes
          Show this thread
        8. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          But as much as *I* care about that, it's something of a minor point in the grand scheme. The big issue here is privacy. And WebViews are even worse than just letting the app itself sniff and rewrite all the pages you see... ...remember those out-of-date WebViews?

          2 replies 0 retweets 4 likes
          Show this thread
        9. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          Attacks against WebViews aren't just attacks against the pages, they're attacks against *the host app*. Everything you trusted it with.

          1 reply 0 retweets 6 likes
          Show this thread
        10. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          Now, again, OS vendors are doing a ton to try to fix webviews...but the model is just busted. The attack surface area isn't just the web platform, it's every API the host app bolts on or intercepts. Disaster in the making.

          1 reply 0 retweets 6 likes
          Show this thread
        11. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          WebViews for non-app content are a choice that apps make. Other, better, more respectful and secure choices are available to them. Apps that insist on not taking you out to your browser when you tap on links, but also do not take advantage of CCT/SafariViewController are *bad*.

          1 reply 3 retweets 8 likes
          Show this thread
        12. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          Cannot stress this enough: the only reason this happens is because apps are jealous of your time. They build these upside-down "browsers" because they don't want you to go to your real default browser. They want to keep you in-app. They *worked* to break this.

          2 replies 3 retweets 20 likes
          Show this thread
        13. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          The default behavior for navigation intents is to launch your default browser. Many apps felt this wasn't in their interest, so they put your privacy and security at risk. Demanding they adopt CCT is the *least* we can ask.

          3 replies 5 retweets 13 likes
          Show this thread
        14. Alex Russell‏ @slightlylate 11 Mar 2019
          • Report Tweet
          • Report NetzDG Violation

          So when companies start taking about taking privacy seriously but still default hundreds of millions of users to this dog's breakfast of a broken, privacy violating web experience, don't believe a word of it.

          1 reply 2 retweets 11 likes
          Show this thread
        15. End of conversation

      Loading seems to be taking a while.

      Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

        Promoted Tweet

        false

        • © 2020 Twitter
        • About
        • Help Center
        • Terms
        • Privacy policy
        • Imprint
        • Cookies
        • Ads info