←back to thread

358 points ofalkaed | 1 comments | | HN request time: 0.226s | source

Just curious and who knows, maybe someone will adopt it or develop something new based on its ideas.
Show context
piskov ◴[] No.45555096[source]
Microsoft Silverlight.

Full C# instead of god forbidden js.

Full vector dpi aware UI, with grid, complex animation, and all other stuff that html5/css didn’t have in 2018 but silverlight had even in 2010 (probable even earlier).

MVVM pattern, two-way bindings. Expression Blend (basically figma) that allowed designers create UI that was XAML, had sample data, and could be used be devs as is with maybe some cleanup.

Excellent tooling, static analysis, debugging, what have you.

Rendered and worked completely the same in any browser (safari, ie, chrome, opera, firefox) on mac and windows

If that thing still worked, boy would we be in a better place regarding web apps.

Unfortunately, iPhone killed adobe flash and Silverlight as an aftermath. Too slow processor, too much energy consumption.

replies(4): >>45555141 #>>45555576 #>>45555725 #>>45557264 #
drnick1 ◴[] No.45555141[source]
I am happy this one died. It was just another attempt by Microsoft to sidestep open web standards in favor of a proprietary platform. The other notorious example is Flash, and both should be considered malware.
replies(4): >>45555236 #>>45555238 #>>45556687 #>>45558274 #
ugh123 ◴[] No.45555236[source]
Did Silverlight have the same security issues as Flash?
replies(2): >>45556477 #>>45556486 #
1. cube00 ◴[] No.45556477[source]
Yes, even using C# couldn't save them.

> A remote code execution vulnerability exists when Microsoft Silverlight decodes strings using a malicious decoder that can return negative offsets that cause Silverlight to replace unsafe object headers with contents provided by an attacker. In a web-browsing scenario, an attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

https://learn.microsoft.com/en-us/security-updates/securityb...