What would you consider the best practice to be when running a web-reachable endpoint on the users machine? Just standard HTTPS/WSS and authentication?
-
-
-
The answer is probably "dont do that", but if you really must you need to whitelist origins at the very least.
- 1 more reply
New conversation -
-
-
if you would just stop looking at them then obviously we'd be safer. geez bro, take one for the team!
-
people might not get your irony, so keep looking and inspiring more people to do the same
#makesoftwaresafeagain - 1 more reply
New conversation -
-
-
So what you're saying is, sensitive interfaces should have some predetermined access list for them that must be redefined only when intended to do so? The blasphemy! /s
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I think the local case is partially a response to crippled protocol handlers. Do you think cors/1918 goes far enough?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Hero
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
This Tweet is unavailable.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.