doctorow — 2014-01-24T14:02:06-05:00 — #1
stephen_schenck — 2014-01-24T14:05:58-05:00 — #2
I just unplug my microphone and webcam when I'm not using them.
Item 349 of 1000 in a series of why real computers beat laptops.
duncancreamer — 2014-01-24T14:27:41-05:00 — #3
billstewart — 2014-01-24T14:48:54-05:00 — #4
Can't help you with the microphone, if it's built in to your laptop, but the way to configure lots of applications so they don't bug you with your camera is to put a small BandAid(tm) over the camera. It's got a nice gauze pad to keep the lens clean for the occasional times you do want it, and tape to keep the opaque bits in place.
tribune — 2014-01-24T15:07:42-05:00 — #5
Not sure there is any website I would let have access to my Microphone.
jmorahan — 2014-01-24T15:20:31-05:00 — #6
More evidence (if more was needed after EME) that "the right way for Chrome to behave" and "complies with the relevant W3C standard" are no longer necessarily the same thing.
adonai — 2014-01-24T17:56:22-05:00 — #7
Yeah, I honestly can't think of any reason to give a website access. I suppose there's probably some browser based Skype kind of things, or maybe online multiplayer games or something...
coherent_light — 2014-01-25T01:06:47-05:00 — #8
I go one step further: no default route is set on my desktops. (Irix machines don't need internet access anyhow).
So is this just a problem with Chrome? Is Safari unaffected? (I don't much use Chrome.)
fnordius — 2014-01-27T07:56:08-05:00 — #9
It seems to be an issue only in Chrome, as it is due to how the application manages device access, and has nothing to do with the Webkit rendering engine. Ideally, no website should need access, though.
I personally suspect that access to the camera will become more of a mobile issue, with websites that interact with the real world: scanning codes or uploading photos, perhaps as part of a game where the camera and the geocoordinates are used, or a sound is analysed. Note that I am thinking of cases where the user would want to grant the browser access to the devices, and the caveats about trojan access still apply.
doctorow — 2014-01-29T14:02:18-05:00 — #10
This topic was automatically closed after 5 days. New replies are no longer allowed.