Re: in defence of listener discovery (ISSUE-32, ACTION-84)

"Al Gilman" <Alfred.S.Gilman@IEEE.org>
> If Jim Ley's tactic is already available to malware, aren't we closing the 
> barn door
> after the horse is gone, if we deny this functionality to the AT programs?

There's a difference - in my technique you change the JS exposed method to 
detect only author issued ones - other event listeners are not caught by the 
method so are either using an internal aEL or are all done before I have the 
opportunity to override the method (I can't tell which, but that's from 
testing)  I can catch all author produced one though.

Cheers,

Jim. 

Received on Friday, 31 March 2006 12:52:30 UTC