[Fwd: Re: [www-vrml] view source]

hello list,

do you know de Whitespace programming language? it's unbelievable…


[]'s
andrei
——– Original Message ——–
Subject: Re: [www-vrml] view source
Date: Sat, 10 May 2003 03:17:54 -0500
From: MrPhillip <[email protected]>
Reply-To: MrPhillip <[email protected]>
To: Clayton Cottingham <[email protected]>, <[email protected]>
References: <[email protected]>



All the talk about obfuscation and the appearance of security…
Maybe someone could write a converter from our clear text format to the
Whitespace language…
http://compsoc.dur..ac.uk/whitespace/index.php
<http://compsoc.dur.ac.uk/whitespace/index.php>
then it would be really clear. It would give a whole new meaning to this
tread's subject "view source".

Mr. Phillip Sand Hansel II
http://philliphansel.com

—– Original Message —–
*From:* Clayton Cottingham <mailto:[email protected]>
*To:* [email protected] <mailto:[email protected]>
*Sent:* Saturday, May 10, 2003 1:45 AM
*Subject:* RE: [www-vrml] view source

it wouldnt matter.. in that case one could simply program a rule to
take that case into considreation

and by moving to an XML based language it actually becomes easier!

short of createVRMLFromUrl('/cgi-bin/foo.pl') or some dynamic build
of the world
and even in that case it is possible if you want it bad enough
through tools like lynx… even though its a text only browser you
can do something like this {psuedo code}

$>lynx –source site.com/cgi-bin/foo.pl>>mysourcedworld.wrl

i hope you realise im not arguing here.. just presenting cases!
;)



—–Original Message—–
*From:* [email protected]
[mailto:[email protected]]*On Behalf Of *Leonard Daly
*Sent:* May 9, 2003 9:34 PM
*To:* Clayton Cottingham; Brian Hay; 'Cindy Ballreich';
[email protected]
*Subject:* RE: [www-vrml] view source

I was referring to delivering the data to the world as requested
and inserting it into the world via createVrmlFromUrl. It does
not make it impossible, just more difficult.

Leonard Daly



At 03:52 PM 5/8/03 -0700, Clayton Cottingham wrote:

> ive scraped pages before for this employer or that
>
> its not that hard to remove the data from the presentation
> the info from the html
>
> especailly with regular expressions….say under perl
>
>
>
>
> —–Original Message—–
> From: Leonard Daly [mailto:[email protected]]
> Sent: May 8, 2003 3:45 PM
> To: Clayton Cottingham; Brian Hay; 'Cindy Ballreich';
> [email protected]
> Subject: RE: [www-vrml] view source
>
> At 11:52 AM 5/8/03 -0700, Clayton Cottingham wrote:
>
>> from a designers POV this will change from project to
>> project
>
> Then it's your client's call. It's OK to change as long
> as the [creation and player] tools supportwhat you
> want/need to do.
>
>
>
>> not everyone is extremely worried about security
>
> Security is just one of the concerns that are necessary
> for running an organization (business, government,
> non-profit, family). The requirements for security need
> to be balanced against those for openness, innovation,
> communication, etc.
>
>>
>> course there is a lot of news about scraping web
>> pages as of late
>> and the only way to stop that is to bring on the lawyers
>
> You can limit what you put on your web page. The more
> complex the page the more difficult it is to extract the
> desired information. The security schemes you choose to
> implement need to cost less than if that information is
> available. It needs to cost your competitors more than it
> would to develop or license it from you.
>
> Leonard Daly
>
>> —–Original Message—–
>> From: [email protected]
>> [mailto:[email protected]]On Behalf Of
>> Leonard Daly
>> Sent: May 8, 2003 10:35 AM
>> To: Brian Hay; 'Cindy Ballreich'; [email protected]
>> Subject: RE: [www-vrml] view source
>>
>> It is important to decide what you need to protect.
>> Any answer is acceptable, because it's based on your
>> business (or security) model. Just realize that the
>> more you decide you need to protect, the more
>> expensive the result.
>>
>> In dealing with the CAD vendors, I was told that
>> their models are the most important IP of their
>> customers. Of course, those same customers said they
>> wanted web (or CD) distribution of those models. It
>> turned out that the CAD models (with detailed curves,
>> dimensions, tolerances, etc.) were what needed
>> protecting. A web-size tessellation of the model was
>> sufficiently coarse that there was no problem with
>> releasing it to their business partners.
>>
>> Data can be retrieved from during the running of the
>> world (e.g. createVrmlFromUrl) that provides
>> additional security. No solution is 100% effective.
>> Getting 80% of the way there is easy. Figure out
>> your cost (or loss of business) if your competitor
>> gets your IP. Don't spend more than that protecting it.
>> Leonard Daly
>>
>>
>>
>>
>>
>> <trimmed up a bit…>
>



+——–
| Leonard Daly <[email protected]>
| Project Management http://realism.com/
| e3D News Technical Editor http://e3dNews.com/
<http://e3dnews.com/>
| SIGGRAPH 2002&2003 X3D Course Organizer
| X3D Specification Co-Author
+——————————

+——–
| Leonard Daly <[email protected]_>
| Project Management _http://realism.com/_
| e3D News Technical Editor _http://e3dNews.com/_
<http://e3dnews.com/>
| SIGGRAPH 2002&2003 X3D Course Organizer
| X3D Specification Co-Author
+——————————



"First of all you can't be subversive without being subversive to yourself, that's very important. You miss something crucial if you think subversion means to have clearly defined enemies and act against them. The enemy always is always you, too and in the first place."
http://www.koreawebart.org/2001/0100101110101101org.html

[email protected]
fone: 92067436
url: http://www.lelic.ufrgs.br/andrei/
url: http://www.atravesdoespelho.hpg.com.br/