<div class="gmail_quote">On Thu, Dec 10, 2009 at 1:36 PM, Oliver Hunt <span dir="ltr"><<a href="mailto:oliver@apple.com">oliver@apple.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div style="word-wrap:break-word"><div><br></div><div>Additionally there's the question of origin tainting -- is it possible to taint the origin in a worker? you don;t have image elements, you can't xhr unsafely to other origins, but maybe i'm missing something?</div>
</div></blockquote><div><br></div><div>Is origin tainting relevant here because we want to make sure the image being processed before upload does not get sent to malicious site by the compromised worker script? It seems UA should taint the connected documents once worker gets tainted. </div>
<div><br></div><div>There is importScript that can go cross-origin, just like <script> tag. Going to http or different origin should trigger 'mixed content' indication in UA for all pages connected to worker. XHR is SOP but there are bad SSL certs. Normally the workers XHR would silently fail if received a bad SSL cert response, but if the user previously replied "trust the site anyways" on the scary dialog while visiting the site, I think the access from worker then goes through with bad cert, since user already 'approved' it for the whole origin.</div>
<div><br></div><div>Dmitry</div><div><br></div></div>