TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

You have the power to put the Jetpacks on Firefox; Extensions 2.0?

3 点作者 ajbatac将近 16 年前

1 comment

stratomorph将近 16 年前
It seems like their time would have been better spent forking and improving Greasemonkey, if they thought it wasn't user-friendly enough or whatever, instead of re-doing everything.<p>As I recall, there were significant problems with Greasemonkey's original approach of leaving privileged user scripts in the global namespace while untrusted scripts from the web execute, since it could wrap objects user scripts would later call, potentially turning any normal function call into a state-stealing XMLHttpReq. From a quick read of the jetpack site, it appears that user code does indeed remain accessible while untrusted code executes (since the jetpack.tabs object is noted to be "live"). I wonder how they deal with that problem of hostile-wrapped objects? [Edited for detail and clarity]
评论 #619619 未加载