this post was submitted on 19 Nov 2024
51 points (94.7% liked)
Open Source
31358 readers
146 users here now
All about open source! Feel free to ask questions, and share news, and interesting stuff!
Useful Links
- Open Source Initiative
- Free Software Foundation
- Electronic Frontier Foundation
- Software Freedom Conservancy
- It's FOSS
- Android FOSS Apps Megathread
Rules
- Posts must be relevant to the open source ideology
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon from opensource.org, but we are not affiliated with them.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'm confused. How are you defining "download" and "online" here?
The website suggests that the server holds the files and does the extraction:
which fits with the github claim of:
but the website also states that:
which suggests that the server has nothing to do with it, and you do actually download the zip files first.
What am I missing?
I have no clue what's meant by "without download", but this app just uses web assembly to inspect the archive in the browser. The sandbox they talk about most likely refers to the browser sandboxing.
So it pretty much boils down to "risking running malicious code is fine, because this app as a whole is treated as malicious by the browser".
Yeah, that's what I was suspecting.
I ended up leaning towards "download" being used in the boomer way of meaning any data transfer, whatever the direction, which in this case would more specifically be called an "upload". And that "online" was being used to mean "using a website", even though the local processing is offline.
The alternative fit to the description I had considered was a website you could give an URL, so it retrieves the zip file and allows you to inspect it remotely, and maybe just download some of the contained files, so it deals with the risk and bandwidth issues for you. That would be a different kind of useful, though it'd only be a few days before someone uses it for malign purposes and gets the site operator a no-knock visit from the fuzz, so that seemed much less likely.
I can see a use for an app that can be used where they can't be installed, though.