• 2 Posts
  • 5 Comments
Joined 2 years ago
cake
Cake day: November 23rd, 2022

help-circle

  • OK I got it, you are completely out of the loop here.

    You do not grasp the idea of NoScript and other JS filtering extension. This is not about server code, your all arguments is baseless here.

    By the way JS refered to Javascript and not NodeJS.

    Anyway I got you whole company/business talk about “keeping the service available, secure, performant” and “GDPR […] bankrupting fine”… yeah lemmy.world.


  • Thanks for your answer.

    First I don’t even grasp what a “service owner” is.

    Second, for JS front-end openness there are already a bunch of app (web, android) that are open-source and secured. Everything has dependencies nowadays, this doesn’t prevent good security. Think all the python app and their dependencies, rust, android… even c\c++ packages are built with dependencies and security updates are necessary (bash had security issues).

    I think with JS scripts it’s actually even easier to have good security because the app is ran in our web browser so the only possible attacker is the website we are visiting itself. If they are malicious then the close-sourced JS script is even worse. Unless you count 3rd party scripts embedded that bad dev uses in their website without even thinking about trusting them. That is also awful in both open or close source environment.

    So even having imperfect security (which happens regardless to openness), who is the attacker here? I would rather run js script on my end if the code can be checked.