Zarutian has quit [Read error: Connection reset by peer]
Zarutian has joined #sandstorm
xet7 has quit [Quit: Leaving]
tg` has joined #sandstorm
xet7 has joined #sandstorm
<TimMc>
Ah, thanks!
Zertrin has joined #sandstorm
Zertrin_ has quit [*.net *.split]
tg has quit [*.net *.split]
Salt has quit [*.net *.split]
davidar has quit [*.net *.split]
tg` is now known as tg
Salt has joined #sandstorm
<TimMc>
I was a little worried by "When the user opens any grain that they do not own, the grain is implicitly added to the user's capability store." but it looks like there isn't a way to trick a user to opening a grain, e.g. in a hidden iframe, and force the grain into their list.
<kentonv>
TimMc: Right, this is why Sandstorm asks you if you want to visit the grain "incognito".
<kentonv>
The grain doesn't land in your grain list unless you choose to reveal your identity.
<TimMc>
++
<kentonv>
(and, more importantly, the grain owner can't harvest your identity by getting you to click on a link.)
davidar has joined #sandstorm
<TimMc>
Also interesting to read the reason that passwords aren't implemented.
<TimMc>
I guess since usernames aren't unique, you sort of have to rely on the *password* being the globally unique thing... which of course it won't be for many users. -.-
<simpson>
Yeah, in other capability systems, you typically don't get any agency for choosing names/passwords, for exactly this reason.