On Tue, Dec 28, 2010 at 4:05 PM, Tateru Nino <tateru.n...@gmail.com> wrote:
>> >> So that avoids 2.e > I'd be more concerned about capabilities URIs, myself. The login > credentials are only the front-gate. > Thats absolutly true, and it would be trivial to inject a pay packet or any other packet into the data stream. But its probably far far easier to place malicious code in a TVP binary. So unless you are going to download the source to a TPV and diff it against LL code base, then compile yourself (ensuring all dependencies are also provided by LL/built by yourself), are you really any more at risk? , i'm just being a bit of a devils advocate here, my first comments were a literal comparison of if they met the TPV rules for listing. Robin _______________________________________________ Policies and (un)subscribe information available here: http://wiki.secondlife.com/wiki/OpenSource-Dev Please read the policies before posting to keep unmoderated posting privileges