Safe Browser Dev Updates (@v0.4.2)

0.3.3

This is a development release which addresses, @Krishna’s notes from the feedback thread about spoofing token’s in memory in beaker.

Now beaker/safe-js derives it’s token and storage from the host name automatically, meaning no two sites should be able to access the other’s data via supplying the same token.

This is implemented via a small check in safe-js. The token param of authorise is not needed for beaker, but mandatory for other js environments.

Questions:

Right now, in 0.3.3 safe browser is overwriting the vendor portion of the app packageData object. I think this is useful as the launcher displays the URL which made the request. Avoiding, perhaps, a site that pretends in the packageData to be another app.

This is certainly not ideal for cross-device apps (browser vs desktop vs mobile), so I was wondering, @Krishna, @frabrunelle do you think we can have an optional field for host to be displayed in the launcher, to clarify for ‘browser situations’ where exactly the request originates? (which could be optional for apps, but not for safe-browser sites?) Or is this, perhaps, overkill? Or even, moot, given the latest launcher discussions?

Download

1 Like