You could also just as well host your own bridge in that case. You may claim “privacy” but they could also send you code stealing your nuts either way.

The browser is made to execute interactive applications from a source in a limited context. Not allow you to do anything and everything.

Reply to this note

Please Login to reply.

Discussion

I said "without additional software". Running your own bridge is additional software.

What I’m trying to say is the additional software part does not matter and you can use a bridge hosted by the dev or a public one in a way that doesn’t worsen the risk model (the client dev can backdoor and steal nuts anyway)

yeah all that works here as well with https or some other transport encryption but it also works without a bridge, directly from your browser.