Hacker News new | past | comments | ask | show | jobs | submit login
New in Chrome 66 (developers.google.com)
99 points by rbanffy on April 18, 2018 | hide | past | favorite | 48 comments



I went to msnbc to confirm that autoplaying content was blocked...only to find that the video is set to start playing when you scroll the page, as well. Jesus.


uMatrix should fix that.

https://github.com/gorhill/uMatrix


the web is really painfull without umatrix, but everyone so far failed to make a decent ui for firefox mobile :(


The new FF UI on mobile (Android at least) is pretty decent once they got rid of the stupid tab bar at the top.


It would make sense to have an option to prevent a website from running any auto-play video just like you can mute a whole website.


Youtube?


And

- What's New In DevTools (Chrome 66): https://developers.google.com/web/updates/2018/02/devtools

- What's New In DevTools (Chrome 67): https://developers.google.com/web/updates/2018/04/devtools


Not that a HN post is needed, they'll be sure to annoy you with a popup next time you open the devtools.


Doesn't annoy me.


That's me! Questions / feedback welcome


Thanks for all the great work on dev-tools. I recently started developing a chrome extension and found that not all of the great standard functionality was present. Here were some of the main pain points:

- debugger; statements do not work for me

- When right clicking the extension and clicking Inspect Popup, the first few network requests are not reported in the network tab (seems that it starts recording after the extension opens)

- It took a very long time for me to figure out that cookies were not being set due to this permission: (https://developer.chrome.com/extensions/declare_permissions)

- Hot-reloading extension code would be extremely nice

Even just extra documentation on dev-tools with extensions or tips/tricks for debugging extensions would be excellent - I haven't been able to find much in the way of docs. Keep doing the excellent work you're doing, just thought I'd give some suggestions :)


Learning more about Extensions is one of my nagging TODOs. I'll see if our Extensions writer is up for the task, otherwise I'll take a crack at it this quarter. Thanks for the specific feedback.


I have a few things that have been bothering me forever.

Push Notifications Prompts break the back button. Many times I hit a search result on Google, find the page is irrelevant but I can't go back. That's because the page has prompted a push notification. I can't scroll either. It blocks the whole UI. That's very disruptive.

Second, while Postman is wonderful, Chrome's network tab is the super convenient. A very small change to allow replay requests to work via a keyboard shortcut would make a significant impact on the dev cycle. The use-case is to modify the server code then replay the request, rinse, repeat. The alternative is to copy-as-curl or proxy via postman, etc.


Yeah, replaying requests is a feature request we get often. I’ll add your comment to the tracker.

I haven’t heard of that problem with push notifications. That’s not our area but I’ll forward it to the Chrome team.


Any chance of being able to save the network filter? It takes ages to re-enter a set of filters for request type, source, name etc. on every page refresh, to the point where I've got a bookmarklet so I can at least just copy and paste it in every time.


Is there an idomatic way to associate local and web-served files for apps under development? It sure looks like it, but I can't figure it out.



Thanks!


Needs access to: Device & app history, Location, Identity, Photos/media/files, Camera, Microphone, Other.

So, everything.


Are you talking about accessing location, files, camera, and microphone from web browsers? Those are all already possible. For identity, there's various libs and APIs for authenticating with major identity providers. Not sure what you mean by device and app history.


That's the list this browser requires authorization before installation is allowed. Its not about what's possible; its what intrusiveness Chrome demands. Maybe there's a good reason for each one, and the browser will act in good faith.


In order for a website to access camera, microphone, etc., the browser itself needs permission to access those things. The browser prompts you to grant each individual permission to specific sites that request them.

I personally agree though that if you don't want any site to ever have access to camera (for example) there should be a way to install the browser without that permission enabled. Maybe there is? I'm not completely familiar with the iOS / Android / other mobile OS install workflows these days.


It seems the new Clipboard API requires explicit permission (video on [0]), that's not going to increase adoption I suppose.

[0]: https://developers.google.com/web/updates/2018/03/clipboarda...


Reading from clipboard without explicit permissions would be a severe security issue.



Yup, I have passwords and such in there.


Writing to a clipboard when you’re the active tab doesn’t require the prompt, I’d imagine that covers the vast majority of use cases. I can’t think of any good reason why a site should be able to read from the clipboard silently, or write to it in the background.


A clipboard history web app isn't the craziest idea in the world, though it's at least moderately crazy.


Prioritizing the use case of the clipboard history web app would ruin the day for many 1Password / LastPass / KeePass etc users.

Automatic password filling isn't great, isn't universal, KeePass's keyboard emulation never worked reliably for me, so users of such apps rely on the clipboard a lot.

And consider that you don't have to give out a password frequently via the clipboard, you only have to do it once with a malicious app nearby.

What I'd like the OS itself to do is to block by default copy/pasting between apps, with the user agreeing to each combination, with "only once" option available.

But sadly, for historical purposes I guess, or maybe because normal users would get annoyed, the OS doesn't do that.


"What I'd like the OS itself to do is to block by default copy/pasting between apps, with the user agreeing to each combination, with "only once" option available."

Please no. At present any application which could compromise you by stealing passwords could probably just as easily pwn your entire system thus you will have saved zero people from harm. Meanwhile 99.9% of people will be frustrated by such an ill thought out security measure. 50% will have to google how to fix clipboard permissions to disable this. 25% will ask their computer literate friends how to do this. 20% will click once every single time and just think the new release of their OS sucks slightly. 10% will accidentally click deny at some point and think cut and paste is broken. Some percentage will probably reinstall their entire OS to fix cut and paste or just hate their life every time they hit this application combination.

Random web pages should probably just never have access to your clipboard because people will just click accept when the malicious site askes. Its sufficient that your browser which you either trust or are already laughably pwned to have access to the clipboard so that you can paste stuff into websites. Said sites don't even need to know the difference between user typed foo and user pasted foo.


> What I'd like the OS itself to do is to block by default copy/pasting between apps, with the user agreeing to each combination, with "only once" option available.

This made me think. At the cost of learning new key combinations, a clipboard manager browser extension could isolate in-browser copy/pastes from the system clipboard, unless explicitly asked.


It might not win but it's a serious contender.


And yet, I bet there's at least a few dozen people in the world that would fall in love with such a thing, and get viciously angry if you tried to mess with their workflow.


And it's not crazy for the user to grant it permission.


New is the Symantec PKI blocking. There are still plenty websites which did not renewed their outdated Symantec certificates.


Sounds like this might be the kick in the ass they need to get new certs


Yup. I updated it for one our web services today, haha. But it was really my mistake. I had received the new cert soon after Google's advisory. :p Consider ass kicked, and lesson learnt to do these things right away, when I earlier today received a mail from a colleague alerting me of Chrome 66 going stable...


Bottom bar on Android is gone. It is so hard to get used to top bar again.


I am missing bottom bar since I stopped using Windows Phone :(


jQuery becomes less needed by the second, unless you want compatibility with other and older browsers, which is almost a given. :)


Are changes like CSS typed objects a new web standard or Chromium independently making decisions? Can we expect safari/firefox/ie to support this soon or is this only useful if my entire userbase uses chrome?

edit: found the spec https://www.w3.org/TR/css-typed-om-1/ so I think it's reasonable to expect parity from other vendors eventually


> Typed OM landed in Chrome 66 and is being implemented in Firefox. Edge has shown signs of support, but has yet to add it to their platform dashboard.

Sigh. What happened to standards? This entire update is a bucket of changes that nobody can use because IE, Firefox, Safari, and mobile are not even close to implementing them.


A google search for "firefox attributeStyleMap" yielded little info about the state of this, but one of the results was a specific commit at a mercurial repository at Mozilla[1], and it seems to be a patch to add this. So perhaps it's much closer than you think?

Edit: Actually, I wasn't paying too much attention to the commit initially. Apparently it's not implementing attributeStyleMap, it's using it as if it exists, so I suppose it's already implemented in this branch, or this is a test in anticipation of it.

1: https://hg.mozilla.org/mozilla-central/changeset/f4e33c42faa...


No, you've linked a merge commit, which is merging a bunch of stuff.

One of the things it merges is BZ # 1442425 which is landing a newer version of the W3C's set of web platform tests, seen here testing the Typed OM feature you are interested in:

https://github.com/w3c/web-platform-tests/tree/master/css/cs...

So, this actually tells you nothing about whether Firefox is interested in implementing this or plans to do so.


Hmm, so what is the status of this W3C draft[1] (which they say specifically does not imply endorsement), if the W3C is putting a test for it in one of their test suites? Or do Chrome/Chrome devs get commit bits? Or maybe one of the purposes of this is to serve as a way for browsers to coordinate on implementations even before it's become a standard? (It's obviously a way to coordinate on things that are a standard).

1: https://www.w3.org/TR/css-typed-om-1/


It is a standard, what do you want browsers to do, all hold off until they have all implemented?


Not quite, but new and unproven features are supposed to be hidden behind a runtime flag to prevent a hot mess like what was caused with CSS/JS vendor prefixes.

The Blink team are getting better at this, but they still really need to put their feet on the brakes a little more, and wait until there are at least two implementations ready before flipping their own switch to enable the feature for all of their users.

With two reasonably complete (and independent) implementations it's far more likely that the standard is engine-neutral, and not lacking in crucial detail. The web platform tests will also have been put to the tests to ensure that they have decent coverage. On top of that, the feature can be considered to have been vetted to ensure that it isn't really just being shoved on the web to meet Google's business needs, but rather in the interests of a broader set of people. These things can easily slip if pushed too quickly, even if others are generally supportive of the general idea of the feature.


ie6-style attack on standards was google plan with chrome from day one. their internal moto was something like "reshaping the future" or sone other facist theme I dont recall now




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: