Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Every hardware capability is potentially available in this kind of framework. It's ultimately up to the user whether an app can get at it, or with what limits. This is an inevitable source of problems for sufficiently reckless users, but it should be possible for reasonable users to keep reasonable control -- not just hacker types.

A "side-loading lobby" wouldn't have grounds to demand more. (The overenthusiastic copyright lobby would probably have better luck in getting their demands wired in, going by history, but that's another issue.)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: