Needless to say, this works on any Browser and any app that runs JavaScript and can display webviews inside of it, including some Nostr apps.

Issues like this are why Amethyst doesn't display Twitter preview cards and play YouTube videos: they all need JavaScript.

nostr:nevent1qvzqqqqqqypzq3svyhng9ld8sv44950j957j9vchdktj7cxumsep9mvvjthc2pjuqy2hwumn8ghj7erfw36x7tnsw43z7un9d3shjqpqjawune5lxy0fk5pd88h0leay3venjm60enw23xj5lv4awdz2pvzscnqx40

Reply to this note

Please Login to reply.

Discussion

That is an interesting idea.

This sounds like an idea to make apps share stuff that feels native, done by the OS in the background.

.. Got my answer for the question I asked on nested post .. ..thanks

One of the reason I like Peergos, they went to an extreme length to sandbox all their apps. Not practical for all apps, but for things that only need to read and write from and to your data store, it works, and it protects your data from all forms of "phone home".

nostr:nevent1qqsttjuan6gtfpu3u2gngekpuewadrdnw8yk2des7zk0pmhjeqle6pgpr9mhxue69uhkxmmzwfskvatdvyhxxmmd9aex2mrp0ypzq3svyhng9ld8sv44950j957j9vchdktj7cxumsep9mvvjthc2pjuqvzqqqqqqylgw2r6

And very unfortunately people have those malicious applications preinstalled on their devices with system permissions, unable to uninstall them. Vendors subsidies device cost this way which is abhorrent. I'm sure people would prefer to pay extra and NOT have that garbage installed on their devices.

This is correct even if you use shizuku+canta to remove those system apps because you can't root your device their preinstall check apps are in /priv/* which reinstall them after it recognizes they have been uninstalled.