<span class="Apple-style-span" style="border-collapse: collapse; "><div class="im" style="color: rgb(80, 0, 80); "><div class="gmail_quote">On Thu, Aug 6, 2009 at 14:28, Benjamin M. Schwartz <span dir="ltr"><<a href="mailto:bmschwar@fas.harvard.edu" target="_blank" style="color: rgb(42, 93, 176); ">bmschwar@fas.harvard.edu</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0.8ex; border-left-width: 1px; border-left-color: rgb(204, 204, 204); border-left-style: solid; padding-left: 1ex; ">
<div>Is sharing an activity a sufficient indication of intent from the user to<br>execute a potentially dangerous action, such as sharing Terminal on a<br>public collaboration server? To activate a remote VNC client in Gnome,<br>
users must fill out this settings panel:<br><a href="http://www.bani.com.br/wp-content/uploads/2007/11/vino-p-g.png" target="_blank" style="color: rgb(42, 93, 176); ">http://www.bani.com.br/wp-content/uploads/2007/11/vino-p-g.png</a> . Unlike<br>
an Activity, though, once those settings are made, the desktop is<br>permanently shared. An Activity can easily be stopped by a single click<br>at any time.<br></div></blockquote></div><br><br clear="all"></div>A malicious attacker can type at speeds which would allow malicious commands to be injected without the user noticing until it is "too late".<div>
<br></div><div>Also, there is no method for "limited sharing".<br>-- <br>Luke Faraone<br><a href="http://luke.faraone.cc" target="_blank" style="color: rgb(42, 93, 176); ">http://luke.faraone.cc</a></div></span>