A long long time ago, we had getNetText and postNetText in Shockwave. We could save little text files in a specific folder. While the Sunder development, each shockwave movie had the option to exist in global space and have access to another SW movie's vars.
Just to do a test of intermovie communication I did a simple polling set of routines to simulate a song playing back with a volume knob and a graphic equalizer back in 1996. http://www.director-online.com/buildArticle.php?id=37 http://web.archive.org/web/19991005142636/http://www.blacktop.com/zav/shockwave/ (I doubt this will even work today.) When this was done, we had turned off that option due to security concerns. We didn't even give a user an option to open it up so that multiple shockwave movies on a page could communicate without having to go through the file system. This was simply done to try to make sure that we didn't create a method for people to write viruses in Shockwave or mess with another movie running in another session without its permission. Sadly, I think that sandboxing is going to be a requirement in iOS (and Mac OS) for security reasons and for other "system integrity" reasons. On May 29, 2012, at 10:17 AM, Mikkel Islay wrote: > > On 29 May 2012, at 01:59, Graham Cox wrote: > >> Nobody has written a better analysis, critique and alternative suggestion >> for sandboxing than Wil Shipley: >> http://blog.wilshipley.com/2011/11/real-security-in-mac-os-x-requires.html > > An interesting post, but his arguments against sandboxing, I think. > Shipley argues from the pretense that App Sandboxing is a technology intended > to shield the user form the intentions of the software developer. That is of > course not the case. From the docs: "App Sandbox provides a last line of > defense against stolen, corrupted, or deleted user data if malicious code > exploits your app." > Of course App Sandboxing will have bugs, and no doubt someone might write an > arbitrarily sophisticated malware app which could make it past the review, > but is that an argument against sandboxing? It is intended to secure apps > (and users) after deployment. Recently someone posted a link to a blogpost, > describing manipulation of the ObjC-runtime to attack third-party apps on > compromised iOS-devices. App sandboxing is meant to limit the effectiveness > of that type of attack on OS X. Is that a important or credible type of > attack on OS X? Shipley's arguments all but ignores that question. > The post makes a lot of the weaknesses of app curation, but they are besides > the point. The (relative) merits of sandboxing remain the same, irrespective > of whether it functions in conjunction with the App Store or not. The > argument that app curation is imperfect, doesn't impact the efficacy of > sandboxing against attacks against apps. > Using MacDefender as an example of malware, sandboxing does not deal with, is > a bit of a straw man argument. MacDefender was a phishing scam. App > Sandboxing is not particularly effective against programs designed to fool > users into taking actions which are against their best interest. It was not > really designed to be. > > Mikkel > > > _______________________________________________ > > Cocoa-dev mailing list (Cocoa-dev@lists.apple.com) > > Please do not post admin requests or moderator comments to the list. > Contact the moderators at cocoa-dev-admins(at)lists.apple.com > > Help/Unsubscribe/Update your Subscription: > https://lists.apple.com/mailman/options/cocoa-dev/zav%40mac.com > > This email sent to z...@mac.com _______________________________________________ Cocoa-dev mailing list (Cocoa-dev@lists.apple.com) Please do not post admin requests or moderator comments to the list. Contact the moderators at cocoa-dev-admins(at)lists.apple.com Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com This email sent to arch...@mail-archive.com