-
Notifications
You must be signed in to change notification settings - Fork 307
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Terms of Service/Privacy Policy/DMCA #116
Comments
Begginnings of OpenUserJS#116 Automatically pushing to upstream because these should have been defined.
@sizzlemctwizzle We need to decide if email is enough or an actual physical PO Box to send these in. Issue tickets should not be used since there is no verification of their identity for legal purposes.
My opinions:
No. Going out of your way to hide what your script does is malicious behavior.
I don't see the harm as long as it doesn't obfuscate.
My general rules for deciding to remove a script:
If the answer to any of these questiond is no, I remove the script. It's all about being honest and acting in good faith. If you wrote a script called "Cookie Monster" and advertised that it "captures the cookies of every site you visit and sends them to a third-party server to compromise all of your secure accounts", and the script actually does steal your cookies, I wouldn't remove it because description is honest. It works as advertised, with no chance of the user being surprised by the result. On the other hand, suppose there was script that claims to auto link plaintext urls on any page, and additionally make |
Sounds good... What I was tinkering with on USO a bit before it did its most recent thing was a way to allow end-users to "self-minify" (possible node lib for OUJS) and "self-pack" installations... just to conserve space/bandwidth and minimally protect from certain kinds of detection from maleficent sites. The ultimate intent is to encourage open source for peer review and discourage code that no one can easily read on our site... all before installing... ideally this would be great if it was handled in the user.js engines as an option but that probably won't go over well with GM due to the complexity and no guarantee on adoption elsewhere. Currently this user (and now this user too) has some obfuscations is why this needs clarification. I thought out some of the "strikes" procedures... the rating/issues of course is full peer review... wait a little while... kill the script(s)... if they make an attempt to continue it then kill the user account... of course if it's blatantly obvious that it's malicious just remove the script/user. Keeping this open for a bit so others can pipe in if they want to... from other time zones too. :) |
A while back I removed a user who posted a scam script. It made a bold
|
I really hate scripts with nondescript names and no description. I really
|
Me too... that's why I built Count Issues... if I can catch up enough here between my testing and other duties I'll probably do something similar for OUJS but I'm "dain bread" from earlier today... need time to absorb everything learned today. :) Tiny url types are frustrating as well. |
Could easily compress (deflate, gzip, etc.) them and that would make them much smaller, but since I don't really have a problem with bandwidth and I don't want to waste computational resources since those are more valuable with Nodejitsu. User scripts are very small so I don't understand why they'd care about the size on their end.
How would that work? |
Not always. Consider storage capacities on cell phones for example. With all the apps that people get plus user.js, if there's a cluster size (depends on formatting), phones that have fixed memory instead of replaceable, and the list goes on.
See #121 (comment) Already showing as being done.
Notice the word "I" here in your sentence... as well as... since you have unlimited bandwidth this leads to this...
Then it could be done just once before it hits nodejitsu... and would ease up their computational resources by not having to gzip it on the fly back to the end user. ;) Regardless of whether it could be implemented it would be encouraging open source rather than encouraging authors to minify/obfuscate. It would also keep the moderators and up from getting burnt out too quickly. I may end up doing this in my cross-stream of GM at some point but until recently my machines were slower than a snail... MITM seems to be the current route in the short term assuming I get some more time to work on that feature.
Think |
I didn't realize Express compresses streams too. Good to know.
This is good reason to implement minifying on the site. If we do it for them, maybe they'll let us get a look at the original source. I'd also give us good cause to ban minified scripts on the site since there would no longer be a valid reason to upload them. |
Now I think we're in the same book now. ;) :) I've had a few years to think about this with installWith... just haven't had much chance to do anything server side instead of MITM and maintaining things that I didn't have raised privileges for. Plus it could definitely give OUJS more of an edge. Doesn't have to be right away but thank you for considering it. :) I have many more ideas just need the time to present/share, implement, test, and get deployed... and ease the learning curve for myself too. |
I have tons of ideas, most of which are half-baked (my imagination far exceeds my grasp). Most of my cycles go towards existing things that need to get done. |
Just so you are aware... I've been tracking some questionable users so far and this author had a script that was questionable but now it's gone... need determination on what to do with these people. It would be highly recommended to get flagging working soon so we can track these on site rather than off site. |
And now that author is back just within the last 17 minutes with more auto-liking... I've given official "warning" in the issues... If either one of those scripts (this and this) "disappear" again... I will consider this malicious I think. |
Applies to OpenUserJS#116
Why not have a delayed publication system instead? |
You could even add some kind of approved rating to script writers that write approved scripts. |
In conclusion, I believe a review-based approval system for deciding which scripts and updates should be published to the site would hurt it far worse than it could ever help. The best solution is putting in place proactive measures to warn moderators and users of potentially malicious scripts, and letting users and moderators work to together to remove malicious scripts. Punishing everyone (the most active script authors will be the most inconvenienced, and they are our greatest draw) for the actions of a tiny minority is a terrible idea. It might make users feel safe, but it will push script authors elsewhere (I know I'd leave) and users will eventually follow them once they realize all the best scripts are being published somewhere else. |
Applies to OpenUserJS#116 One of my favorite quotes is used in here from Moz the rest is from the ol' noggen.
Applies to OpenUserJS#116
* Applies to OpenUserJS#116
* Applies to OpenUserJS#116
TOS.md still needs Licensing header filled out. This includes:
Now for PRIVACY.md we need to at least describe:
Legal stuff sucks I know... but a necessary evil for full transparency. :) |
…used together. * e.g. let the hosting site resolve those. Applies to OpenUserJS#240, OpenUserJS#167, OpenUserJS#116, and OpenUserJS#60
Applies to OpenUserJS#240, OpenUserJS#167, OpenUserJS#116, and OpenUserJS#60
Do we care about porn linked images for the TOS? e.g. since it's not hosted here and we aren't the culprit? |
I'd say remove them unless we want to come up with an "18+" option for script pages. I know there are plenty of scripts out there for 18+ sites, but whether they would need to link porn images... I'm leaning towards not. |
As long as it's legal in USA (where the site is hosted), I don't care.
|
The only thing I can think of is bad parental controls blacklisting our domain without it... if it's a good software then it will prevent the image from being shown. |
What portion of internet users actually have parental controls enabled? I'd
|
Well pixelated images I wouldn't care about... seeing actual porn at 800ish rez I might. I too am for free speech but I'd rather not see us turn into adult user.js... although that may have a certain appeal to the younger scripters and users visiting. ;) Let's take this portion on a case to case basis for the moment... e.g. leave it undefined and see what kind of results we get. So far I haven't seen any on OUJS yet... but that doesn't mean they aren't lurking about. |
I agree with you. We should deal with it on a case by case basis for now and see how it goes.
|
I'm going to to attempt to finish this off tonight... I believe that I've got a current grasp on the PRIVACY now... only remaining thing I need to know is if we do or don't support non-OSI licensing... I can go off of #56 for public domain and the other weirder licenses if I need to if no one comments here. It's already clear that no derivative licenses are expressly prohibited... so that will also get in there for TOS. |
* Mostly covered from USO with a few additions/changes Applies to OpenUserJS#116
Applies to OpenUserJS#116
* OSI Code licensing * Default MIT licensing in the presence of CC * No derivatives aren't allowed * Unlicensing isn't allowed Closes OpenUserJS#56 and Closes OpenUserJS#116
If you ban or flag malicious users, they can always just create a fresh account and start over. Given that, a positive reputation system might work better. Something like StackOverflow's. Give each user a score (or give each script a score), and let it increase as people review and vote on scripts. Note sure exactly how it would work, but it's something to consider. In fact I think the web needs a cross-site positive reputation system. So I don't have to fill out three Captcha's a day. The web should know by now I'm not an SEO spammer! |
* Change some icons around * Add a tooltip * Move default licensing arbitration to view instead of code... allows visual detection Post OpenUserJS#1204 OpenUserJS#191 Loosely related to OpenUserJS#116, and OpenUserJS#944 via OpenUserJS#970
For moderators and above we really need this in order to effectively manage OUJS.
Currently a few questions for administration off the top of my head:
Regardless of the state of this issue this needs to be created immediately and can be worked on a piece at a time.
The text was updated successfully, but these errors were encountered: