Changes

Jump to: navigation, search

Labs/Ubiquity/Ubiquity 0.5 User Tutorial

430 bytes removed, 03:17, 2 July 2009
Teaching Ubiquity New Commands
It's important to understand the '''dangers''' of subscribing to Ubiquity commands from sites that you don't trust. Since a Ubiquity command can do anything, and it has full access to your web browser, a bad person could write a Ubiquity command to steal your personal information or do malicious things to your computer. You should not install Ubiquity commands unless you are confident that the source is trustworthy.
In the future, we'll be creating something called a "trust network" that Ubiquity users can use to share knowledge about which commands are trustworthy. When you visit a page with an embedded command, you'll be able to see what your friends with == Finding New Ubiquity have said Commands == TODO: Add information about this command -- whether they've given it a thumbs-up or left you a warning to let you know it could be dangerous. This system doesn't exist yet, but once it does we will modify this section of the tutorial to let you know how to use itherd here.
150
edits

Navigation menu