- Apr 2024
-
arxiv.org arxiv.org
-
Naturally, an actual Grassroots Social Networking application may integratethe two protocols to provide both public feeds and private groups
Perhaps better to have a permissions mechanism that is generic to express both cases, and more, so folks can manage it flexibly as they need.
-
The WhatsApp-like network has private groups, members of each group being both the authors andfollowers of its feed
This couples two things: read permissions, write permissions.
Having them defined separately and explicitly, group's empowered with flexible controls.
E.g., as in OrbitDB's policies.
Tags
Annotators
URL
-
- Nov 2023
-
en.wikipedia.org en.wikipedia.org
-
One such way that social media accounts are exploited is when users are enticed to download malicious browser extensions that request read and write permissions on all websites. These users are not aware that later on, typically a week or so after being installed, the extensions will then download some background Javascript malware from its command and control site to run on the user's browser.
-
- Jun 2023
-
support.google.com support.google.com
-
Effective permissions are the roles and data restrictions that a member is assigned via other resources (like the organization, a user group, or an account that includes the current property) plus all the direct permissions assigned explicitly for the current resource. Direct permissions are role and data restrictions that a member is assigned explicitly for the current resource (e.g., organization, account, property).
-
- May 2023
-
developer.mozilla.org developer.mozilla.org
- Sep 2022
-
developer.mozilla.org developer.mozilla.org
-
w3c.github.io w3c.github.io
Tags
Annotators
URL
-
-
www.w3.org www.w3.org
Tags
Annotators
URL
-
- Jul 2022
-
report.ipcc.ch report.ipcc.ch
-
Chapter 5: Demand, services and social aspects of mitigation
Public Annotation of IPCC Report AR6 Climate Change 2022 Mitigation of Climate Change WGIII Chapter 5: Demand, Services and Social Aspects of Mitigation
NOTE: Permission given by one of the lead authors, Felix Creutzig to annotate with caveat that there may be minor changes in the final version.
This annotation explores the potential of mass mobilization of citizens and the commons to effect dramatic demand side reductions. It leverages the potential agency of the public to play a critical role in rapid decarbonization.
-
- Jun 2020
-
www.forbes.com www.forbes.com
-
“The alarming truth,” warned the researcher, “is that the average number of permissions requested by a flashlight app is 25.”
-
“Asking for too many permissions is dangerous,” ESET malware researcher Lukas Stefanko explains. “These permissions can be misused as an exploit to access more device components, such as call logs, phone numbers, and browsing history.”
-
At the heart of Google’s challenge has been so-called permission abuse—millions of apps requesting the rights to access device data and functions beyond those needed to deliver their own functionality.
-
The security feature in Android 11 is a long overdue crackdown on this permission abuse.
-
-
www.forbes.com www.forbes.com
-
Google’s novel response has been to compare each app to its peers, identifying those that seem to be asking for more than they should, and alerting developers when that’s the case. In its update today, Google says “we aim to help developers boost the trust of their users—we surface a message to developers when we think their app is asking for a permission that is likely unnecessary.”
-
- May 2020
-
stackoverflow.com stackoverflow.com
-
Many 3rd parties has some magic parameter which blocks the cookie, but doesn't block the functionality of the element, and I'm looking for something like that. For example brightcove player has a data attribute. Video is working, cookies are not set.
-
- Feb 2020
-
www.ifar.org www.ifar.org
Tags
Annotators
URL
-
-
www.hrc.utexas.edu www.hrc.utexas.edu
Tags
Annotators
URL
-
-
www.midwestbookreview.com www.midwestbookreview.com
-
www.writersandeditors.com www.writersandeditors.com
Tags
Annotators
URL
-
-
www.writersandeditors.com www.writersandeditors.com
Tags
Annotators
URL
-
- Jan 2020
-
- Nov 2018
- Sep 2018
- Aug 2018
- Nov 2017
-
mfeldstein.com mfeldstein.com
-
If you recall your LMS patent infringement history, then you'll remember that roles and permissions were exactly the thing that Blackboard sued D2L over.
-
(At the time, Stephen Downes mocked me for thinking that this was an important aspect of LMS design to consider.)
An interesting case where Stephen’s tone might have drowned a useful discussion. FWIW, flexible roles and permissions are among the key things in my own personal “spec list” for a tool to use with learners, but it’s rarely possible to have that flexibility without also getting a very messy administration. This is actually one of the reasons people like WordPress.
-
- Oct 2017
-
knowledge.kaltura.com knowledge.kaltura.com
-
Category’sEntitlementsTab
-
- Feb 2017
-
blog.overstuffedgorilla.com blog.overstuffedgorilla.com
-
blog.overstuffedgorilla.com blog.overstuffedgorilla.com
- Jan 2016
-
blog.brownplt.org blog.brownplt.org
-
Some of the answers for Android app permissions might have relevance to Chrome extensions.
-
- Jul 2015
-
www.collegeart.org www.collegeart.org
-
- CAA's long awaited guidelines for the fair use - reuse - of images within publications.
-
- Feb 2015