Tirea
About
- Username
- Tirea
- Joined
- Visits
- 3
- Last Active
- Roles
- member
- Points
- 28
- Badges
- 0
- Posts
- 4
Reactions
-
How to use Safari's Picture-in-Picture mode with YouTube on macOS
There is an awesome extension for Safari called PiPer that adds a button for PiP mode to websites like YouTube, Netflix, Amazon Prime and many more. It can be downloaded from the Safari Extension Gallery right here: https://safari-extensions.apple.com/details/?id=com.amarcus.safari.piper-BQ6Q24MF9X
The source code is also available on github for anyone who's interested! -
How to use Safari's Picture-in-Picture mode with YouTube on macOS
commentzilla said:
That plugin seems to have a lot of unnecessary permissions... why does it need access to all of my personal information to include Credit Cards and Passwords?Zero chance that's going to stay on my computer. Apple should remove it. -
How to use Safari's Picture-in-Picture mode with YouTube on macOS
I have two ad-blockers that do not have permission to read webpages or anything else. Download and install a bunch of different plugins and you'll see all different kinds of permissions. Some do have access to everything, like TrafficLight (Bit Defender) a web security plugin.Different plugins have different permissions based on how the plugin in configured by the developer. Why would PIPer need access to Credit Cards, Passwords and browsing history to provide a shortcut for a picture-in-picture mode? If an ad-blocker doesn't need it, why in the hell would a simple shortcut need it when all of the functionality is already built into macOS? I've also never seen a plugin with such a specific list of websites, it's certainly not a generic list. That list seems to have been programmed into the plugin which is probably where Apple got it.I suggest reconfiguring the plugin so it does not access unnecessary personal data.Also, just because something is on GITHUB does not automatically make it safe.
No not every safari extension that's out there, just the ones that inject custom code into the browser/webpage. There are a ton of extensions that don't access any sensitive information but get this warning because they use some form of code/script injection to work, which means they technically could inject a script that steals your private data. This includes trusted extension like the ones from DuckDuckGo or Parallels Desktop (like I mentioned) or the one from BitDefender you mentioned, even extensions from apps that are available in the Mac App Store and have to follow the MAS guidelines tend to get this warning. A ton of developers of very awesome and trustworthy safari extensions constantly get complaints because when users read that warning they immediately think that the extensions uses their private data even though they do not.
While the list is indeed very specific, it's the websites that PiPer works with which means Safari will warn you about them because PiPer injects its code into those websites to give you that convenient PiP button. Most extensions are designed to work for every website so the warning will read "all websites" instead.And I never said it's safe because it's on github! I said the source code is available on github because I know that safari extension are constantly being reported as "unsafe" just because Apple implemented this warning and so for everybody that has some understanding of JavaScript, please have a look at the source code and see for yourself what PiPer does and how it works. -
How to use Safari's Picture-in-Picture mode with YouTube on macOS
bloggerblog said:commentzilla said:Tirea said:There is an awesome extension for Safari called PiPer that adds a button for PiP mode to websites like YouTube, Netflix, Amazon Prime and many more. It can be downloaded from the Safari Extension Gallery right here: https://safari-extensions.apple.com/details/?id=com.amarcus.safari.piper-BQ6Q24MF9X
The source code is also available on github for anyone who's interested!Zero chance that's going to stay on my computer. Apple should remove it.
Here's a link to the source code
https://github.com/amarcu5/PiPer