88
edits
Line 7: | Line 7: | ||
Others implement an entire parallel application platform (Flash Player, Java, Silverlight) which include their own runtimes and enforce their own security model upon the content running within. | Others implement an entire parallel application platform (Flash Player, Java, Silverlight) which include their own runtimes and enforce their own security model upon the content running within. | ||
Especially in the latter case, | Especially in the latter case, it's important to capture the security model or mitigation that the plugin places upon content when it attempts to access those APIs. | ||
Please note that the "APIs Required" column reflects the current APIs that plugins use or need to support this use case. In some cases, Pepper may be able to support them directly instead. | Please note that the "APIs Required" column reflects the current APIs that plugins use or need to support this use case. In some cases, Pepper may be able to support them directly instead. |
edits