>>> We discussed this a bit with Anne on IRC. It seems like this API is a good
>>> use case for a permission prompt to the user. Since the API works by
>>> registering an event listener, the only realistic option seems to be
>>> Permission.request() before registering the event listeners. Unf
On 09/22/2017 11:33 AM, Blair MacIntyre wrote:
What's the reason for this? I don't know for sure, but it may be necessary for
things like AR/VR to have higher resolution than that.
The reason is to limit the frequency of sensor data the web application
receives to allow it to guesstimate the c
On Fri, Sep 22, 2017 at 4:50 PM, Ehsan Akhgari wrote:
> We discussed this a bit with Anne on IRC. It seems like this API is a good
> use case for a permission prompt to the user. Since the API works by
> registering an event listener, the only realistic option seems to be
> Permission.request()
On Fri, Sep 22, 2017 at 8:39 AM, Ehsan Akhgari
wrote:
> Hi everyone,
>
> A couple of weeks ago, this proof of concept attack circled its way around
> Twitter:
>
> https://krausefx.github.io/whats-the-user-doing/
>
> This simple web app, once loaded on mobile, with a disturbing degree of
> accurac
>> What's the reason for this? I don't know for sure, but it may be necessary
>> for things like AR/VR to have higher resolution than that.
> The reason is to limit the frequency of sensor data the web application
> receives to allow it to guesstimate the changes to the device position to
> limi
On 09/22/2017 10:20 AM, James Willcox wrote:
On Fri, Sep 22, 2017 at 8:39 AM, Ehsan Akhgari
mailto:ehsan.akhg...@gmail.com>> wrote:
Hi everyone,
A couple of weeks ago, this proof of concept attack circled its
way around Twitter:
https://krausefx.github.io/whats-the-user-doi
On 09/22/2017 09:53 AM, Tom Ritter wrote:
On Fri, Sep 22, 2017 at 8:39 AM, Ehsan Akhgari wrote:
* Ensure that we don't leak this information when fingerprinting
resisting is turned on for the Tor Browser if we don't already.
Tor sets device.sensors.enabled to false, which should disable the
On Fri, Sep 22, 2017 at 8:39 AM, Ehsan Akhgari wrote:
> * Ensure that we don't leak this information when fingerprinting
> resisting is turned on for the Tor Browser if we don't already.
Tor sets device.sensors.enabled to false, which should disable these
events. (If that's not the case, we'd l
Hi everyone,
A couple of weeks ago, this proof of concept attack circled its way around
Twitter:
https://krausefx.github.io/whats-the-user-doing/
This simple web app, once loaded on mobile, with a disturbing degree of
accuracy, can tell what the user is doing with their phone, for example,
using
9 matches
Mail list logo