Stories
Slash Boxes
Comments

SoylentNews is people

posted by chromas on Wednesday September 19 2018, @02:20PM   Printer-friendly
from the is-anyone-using-it? dept.

Molly de Blanc writes at that it has been one year since the World Wide Web Consortium (W3C) sold out. It was then they, including Tim Berners-Lee himself, decided to incorporate Encrypted Media Extensions (EME) into web standards signalling an end to the open Web. She covers how it happened, what has transpired during the last year in regards to EME, and what steps can be taken.

Digital Restrictions Management exists all over the world in all sorts of technologies. In addition to media files, like music and film, we can find DRM on the Web and enshrined in Web standards. As a Web standard, its use is recommended by the World Wide Web Consortium (W3C), making it not only easier, but expected for all media files on the Web to be locked down with DRM.

It's been a year since the the W3C voted to bring Encrypted Media Extensions (EME) into Web standards. They claimed to want to "lead the Web to its full potential," but in a secret vote, members of the W3C, with the blessing of Web creator Tim Berners-Lee, agreed to put "the copyright industry in control" of media access. The enshrinement of EME as an official recommendation is not how we envision the "full potential" of the Web at the Free Software Foundation (FSF).


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by bzipitidoo on Wednesday September 19 2018, @08:38PM (1 child)

    by bzipitidoo (4388) on Wednesday September 19 2018, @08:38PM (#737207) Journal

    It's not that big a pain. This works for me:

    user$ sudo xhost+
    user$ su otheruser
    otheruser$ firefox

    It's not 100% secure-- it is possible that instance of firefox can do a screen scrape. But I figure that in combination with making sure nothing sensitive is on any display is good enough to defeat 99.99% of attempts to breach it.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 4, Informative) by unauthorized on Wednesday September 19 2018, @09:02PM

    by unauthorized (3776) on Wednesday September 19 2018, @09:02PM (#737221)

    Never use xhost+, that gives front door access to everything X controls for everyone on your entire network. At least use "xhost +localhost", which still gives access to all input and display devices to every local process, but at least it keeps everything that can reach your local network from doing so.

    Either way, ssh tunneling or sharing the X cookie is far safer.