33 Matching Annotations
  1. Nov 2023
    1. One such way that social media accounts are exploited is when users are enticed to download malicious browser extensions that request read and write permissions on all websites. These users are not aware that later on, typically a week or so after being installed, the extensions will then download some background Javascript malware from its command and control site to run on the user's browser.
  2. Jun 2023
    1. Effective permissions are the roles and data restrictions that a member is assigned via other resources (like the organization, a user group, or an account that includes the current property) plus all the direct permissions assigned explicitly for the current resource. Direct permissions are role and data restrictions that a member is assigned explicitly for the current resource (e.g., organization, account, property).
  3. May 2023
  4. Sep 2022
  5. Jul 2022
    1. Chapter 5: Demand, services and social aspects of mitigation

      Public Annotation of IPCC Report AR6 Climate Change 2022 Mitigation of Climate Change WGIII Chapter 5: Demand, Services and Social Aspects of Mitigation

      NOTE: Permission given by one of the lead authors, Felix Creutzig to annotate with caveat that there may be minor changes in the final version.

      This annotation explores the potential of mass mobilization of citizens and the commons to effect dramatic demand side reductions. It leverages the potential agency of the public to play a critical role in rapid decarbonization.

  6. Jun 2020
    1. “The alarming truth,” warned the researcher, “is that the average number of permissions requested by a flashlight app is 25.”
    2. “Asking for too many permissions is dangerous,” ESET malware researcher Lukas Stefanko explains. “These permissions can be misused as an exploit to access more device components, such as call logs, phone numbers, and browsing history.”
    3. At the heart of Google’s challenge has been so-called permission abuse—millions of apps requesting the rights to access device data and functions beyond those needed to deliver their own functionality.
    4. The security feature in Android 11 is a long overdue crackdown on this permission abuse.
    1. Google’s novel response has been to compare each app to its peers, identifying those that seem to be asking for more than they should, and alerting developers when that’s the case. In its update today, Google says “we aim to help developers boost the trust of their users—we surface a message to developers when we think their app is asking for a permission that is likely unnecessary.”
  7. May 2020
  8. Feb 2020
  9. Jan 2020
  10. Nov 2018
  11. Sep 2018
  12. Aug 2018
  13. Nov 2017
    1. If you recall your LMS patent infringement history, then you'll remember that roles and permissions were exactly the thing that Blackboard sued D2L over.
    2. (At the time, Stephen Downes mocked me for thinking that this was an important aspect of LMS design to consider.)

      An interesting case where Stephen’s tone might have drowned a useful discussion. FWIW, flexible roles and permissions are among the key things in my own personal “spec list” for a tool to use with learners, but it’s rarely possible to have that flexibility without also getting a very messy administration. This is actually one of the reasons people like WordPress.

  14. Oct 2017
  15. Feb 2017
  16. Jan 2016
  17. Jul 2015
  18. Feb 2015