The origin model allows the origin owner to colonize space on your device.
The origin model allows the origin owner to colonize space on your device. Only the owner of the origin is allowed to deploy code in that origin. That colony is more ...
26 chunks · 16 episodes
The origin model allows the origin owner to colonize space on your device. Only the owner of the origin is allowed to deploy code in that origin. That colony is more ...
The Same Origin model gives origins the right to send data to arbitrary other network endpoints by default. Code being able to transmit data to a possibly sketchy origin i...
...harded blackboards, which allow only limited snapshots of the problem. The same origin model fundamentally curtails the possibility of a blackboard AI system.
... on a technical level, do anything it wants with the data it receives. The same origin model by default allows code to proactively reach out to any other origin. This has a lot of benefits–it allows plugging in other service providers dynamic...
The same origin model makes data crossing origins rare and scary, which leads to centralization. Tools like Information Flow Control, if applied in clever ways, could allo...
The same origin model is too coarse. It treats operations within an origin as very common, and operations across origins as very rare. Within-origin operations are safe an...
...ss / adversarial innovation on file types from different applications. The same origin model is what disallows adversarial innovation on data. This is also what makes filesystems so dangerous for untrusted code to have access to!
...nd of feature is one that we haven't even dreamed could be possible in the same origin model. Imagine if every experience you interacted with was fully customized to you… and you didn't have to worry about your data flowing out to random site...
The same origin model is about silos of data. The origin where the data accumulates might (erroneously!) view the data as "their" data, even when it's their users. You can...
In the same origin model, the app that has the data has the edge. Silos start out with no data. That's what makes it safe to install a new app or visit a new domain. But that...
...n model: requires high trust, but allows coordination between experiences. Same origin model: no trust required, but also no coordination. What if you could have both? No trust required, but also coordination?
...'s not necessary For example, when was the last time you thought about the same origin model, the fundamental security model that undergirds the web and apps? In practice what you're looking for is not "will everyone understand it and therefo...
...m have in common; the animating logic for this whole current universe. The same origin model has been so prevalent for 30 years that we literally can't imagine anything else It colors all of our assumptions about privacy models (and thus the ...
... partially) a consequence of our current laws of physics. It's only in the same-origin model that you get such extreme centralization dynamics. In alternate laws of physics, the concentration of power would be significantly less, making that ...
The same origin model is a one-size-fits-all cage. Very simple to reason about and create, but a poor fit for any given real world situation. You can imagine a system that...
What is the "same origin model"? I talk about it here just about every week, but if you haven't ever worked in building a browser you might not know what it means. The same origin ...
The same origin model is what enabled the web and apps to exist. Without it, they would not be possible. But the same origin model is also the original sin. The same origi...
A sea of confusing permission prompts is downstream of the same origin model. We take for granted is "just how it has to work". But that's not the case! It's actually a hack that is downstream of the decision to use a simple, ...
You could use the same origin model to slingshot beyond it. What if there was an origin that had its own open, gravity well dynamics? Within that origin, you could have a more nuanced w...
...ized primarily by viable business models, not by amount of user value. The same origin model creates a cave where the origin's owner can hoard things. For example, hoarding a bunch of user data they can rent out to advertisers. What if we had...