874
edits
(→Dependency Injection: reworded) |
m (typographic changes) |
||
| Line 27: | Line 27: | ||
to the user, be it destroying or stealing valuable information. | to the user, be it destroying or stealing valuable information. | ||
It's only with the user's consent | It's only with the user's consent—or, more preferably, the consent of | ||
a trusted security advisor, such as an AMO reviewer | a trusted security advisor, such as an AMO reviewer—that a Jetpack is | ||
executed with the privileges that the user or advisor grants to it. | executed with the privileges that the user or advisor grants to it. | ||
The suggested specification of privileges provided by the Jetpack is | The suggested specification of privileges provided by the Jetpack is | ||
edits