IRC channel logs

2023-11-25.log

back to list of logs

<tonyg>one nice thing for UI involving capabilities would be if they could describe the protocols they were willing to engage in. in many systems, use of a separate mirror capability gives access to reflective information like this, which makes perfect sense for intercessory reflection. But what about just querying what methods a cap makes available? Is there a security need to have the authority to request such
<tonyg>information from a cap be itself represented via a separate cap?
<Zarutian_iPad>tonyg: not a new idea but worth expanding on see http://erights.org/javadoc/org/erights/e/elib/prim/MirandaMethods.html#__getAllegedType and the next one too