- From: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
- Date: Thu, 8 Oct 2020 23:00:53 +0200
- To: Jan-Ivar Bruaroey <jib@mozilla.com>, public-webrtc@w3.org
- Message-ID: <d1900413-cdc4-8adc-7263-a2812549aaab@gmail.com>
On 08/10/2020 22:49, Jan-Ivar Bruaroey wrote: > On 10/8/20 3:56 PM, Sergio Garcia Murillo wrote: >> On 08/10/2020 21:36, Jan-Ivar Bruaroey wrote: >>> >>> 2. Is the goal performance? E.g. is recording a web conference call >>> using canvas.captureStream prohibitive? >>> >> canvas.captureStream is not a viable option at all, the idea is to be >> able to capture all the richness of a css+js UI interface, not to >> have to re implement all of it manually (or via webgl). > > So the use case is recording a web conference call? This sounds > appealing until I consider the limitations. The user would have to: > My use case is not conference recording, but implementing a OBS studio on a web page. > I already see requests in the thread for rendering in other > resolutions, which makes me wonder about the approach. In my use case, and extending the captureStream to an Iframe content, I could display the iframe/dom element content with a zoom property of 25% while still capturing the stream at full resolution. >> I agree with the IFRAME argument, we should prevent this for >> capturing contents from outside the domain (and isolated streams). > > Yes, though again I don't know if it can be done safely. E.g. what > would happen if I do > > video.src = "foo.mp4"; await wait(5000); video.src = > "https://vulnerable-site.com/bar.mp4"? > what about fetch("https://vulnerable-site.com/bar.mp4")? I don't understand the issue here. >> IMHO, I would prefer to extend to the media capture from DOM elements >> to the window or document elements (following the same domain >> security policies, of course). > > That's interesting, and might bring in DOM folks that perhaps would be > able to talk to the security ramifications of exposing DOM rendering > in this way (fingerprinting, personal data exposure through CSS > exploits etc). > That seems wise. Best regards Sergio
Received on Thursday, 8 October 2020 21:01:06 UTC