Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

APIs declined by Apple #66

Closed
16 of 22 tasks
polcak opened this issue Jun 30, 2020 · 1 comment
Closed
16 of 22 tasks

APIs declined by Apple #66

polcak opened this issue Jun 30, 2020 · 1 comment
Assignees

Comments

@polcak
Copy link
Owner

polcak commented Jun 30, 2020

https://www.zdnet.com/article/apple-declined-to-implement-16-web-apis-in-safari-due-to-privacy-concerns/

Most probably we are not going to block:

  • Proximity Sensor
  • https://developer.mozilla.org/en-US/docs/Web/API/Proximity_Events: Firefox only, needs to be explicitely enabled; not supported by currently maintained versions (removed in 89)
  • Support for custom fonts - raises a question what fonts should be presented - this does not
    seem to be suitable for JSR.
  • Minor software update information from the user agent string. The string only changes with the marketing version of the platform and the browser. This makes sense implement only if we decide to create https://pagure.io/JShelter/webextension/issue/44.
  • The Do Not Track flag - this is user configurable and I do not think that we should prevent
    the user from setting it. Report to your DPA sites that violates your wishes. This makes sense implement only if we decide to create https://pagure.io/JShelter/webextension/issue/44.
  • Support for plug-ins: Not a job for JSR.

Already blocked (before opening this issue):

  • Device Memory API
  • Battery Status API
@ihranicky
Copy link
Collaborator

ihranicky commented Mar 6, 2022

UPDATE: Several tasks completed.

With #165, #171, and fb4236e, wrappers were added for the following Generic Sensor APIs:

Some of the APIs seem to be safe enough and do not require wrappers. The API calls are protected by browser prompts that requires a user to explicitly grant access to a concrete device. Those include:

  • Web Bluetooth
  • Web MIDI API
  • SerialAPI
  • Web USB
  • WebHID

Details were added attached to the original issue above.

@polcak polcak closed this as completed May 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants