well, considering that the contract just uses an existing command
line
interface, they could already do that anyway just as easily.
Allen Lowe
On Wed, Jul 18, 2012 at 12:09 PM, Sergey "Shnatsel" Davidoff
<sergey@xxxxxxxxxxxxxxxx> wrote:
> In addition to the aforementioned doc with requested changes,
voldyman
> drafted a doc that describes how the whole thing is expected to
work.
Here
> it is:
>
https://docs.google.com/document/d/1SxrUvlZpbNzjrelfxMljAzwJxR3hvWRbSqQehsK4wl8/edit#
>
> He also makes a valid point about preventing contract misuse, e.g.
a
> malicious app could try to post things to your Twitter without you
even
> knowing.
>
> --
> Sergey "Shnatsel" Davidoff
> OS architect @ elementary