![]() ![]() The matter at hand is not a matter of mere configuration and cannot be addressed by better configuration of Electron. Chrome does have measures in it to do this. I also see no functionality that attempts to determine if code is malicious or not. I understand that this is an opinion that not everyone will share.įor a single specific example, look at the information on permissions and compare to how min handles them. I think the notification suppression feature broke, but nobody noticed it because we've grown accustomed to high speed connections.įor my own part, I find the introduction that specifically warns that Electron is not a web browser and should not be trusted to handle potentially malicious code from over a network to be clear enough. I've tried every Lynx flag and configuration listed, and none of them actually work. On a retro computer at 300 baud, it takes FOREVER, and you have to sit through it for EVERY page. On a modern computer, all that flashes by so quickly that you never see it. Secure 256-bit TLSv1.2 (ECDHE-RSA-AES256-GCM-SHA384) HTTP connection Verified connection to (cert=)Ĭertificate issued by: /C=US/O=DigiCert Inc/CN=DigiCert TLS RSA SHA256 2020 CA1 SSL callback:ok, preverify_ok=1, ssl_okay=0 Enough that it's intrusive.Ĭonnecting to this web site, it displays ALL of the following: Unfortunately, Lynx has bugs that you can't see on modern machines that show up on old, low speed connections.įor example, when connecting to a web site, it displays a whole bunch of connection status information that I just don't care about. I connect my retro computers to the internet through my Mac.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |