Labs/Ubiquity/Ubiquity 0.5 User Tutorial: Difference between revisions

Line 219: Line 219:
It's important to understand the '''dangers''' of subscribing to Ubiquity commands from sites that you don't trust.  Since a Ubiquity command can do anything, and it has full access to your web browser, a bad person could write a Ubiquity command to steal your personal information or do malicious things to your computer.  You should not install Ubiquity commands unless you are confident that the source is trustworthy.
It's important to understand the '''dangers''' of subscribing to Ubiquity commands from sites that you don't trust.  Since a Ubiquity command can do anything, and it has full access to your web browser, a bad person could write a Ubiquity command to steal your personal information or do malicious things to your computer.  You should not install Ubiquity commands unless you are confident that the source is trustworthy.


In the future, we'll be creating something called a "trust network" that Ubiquity users can use to share knowledge about which commands are trustworthy.  When you visit a page with an embedded command, you'll be able to see what your friends with Ubiquity have said about this command -- whether they've given it a thumbs-up or left you a warning to let you know it could be dangerous.  This system doesn't exist yet, but once it does we will modify this section of the tutorial to let you know how to use it.
== Finding New Ubiquity Commands ==
 
TODO: Add information about the herd here.
150

edits