Facilities I'd like to offer in a later version

From Alistair Mann / csi18n
Revision as of 00:00, 14 July 2014 by Alistair Mann (Talk | contribs) (Created page with "A wish list of facilities I'd like to add. === Binaries === csi18n currently supports resources with a limited set of text-based mime types, such as text/plain; text/html etc...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

A wish list of facilities I'd like to add.

Binaries

csi18n currently supports resources with a limited set of text-based mime types, such as text/plain; text/html etc.

It would be useful to store binary types too. Examples:

  • image/png. A specifically created overlay on top of a cartoon could render alternative language text 'as if' it was part of the original.
  • audio/webm. Hear/record/distribute a translation of that TED lecture dialog in your language - no reading skills required of your audience.
  • video/mp4. I could imagine intertitles making use of this, I could imagine public service announcements using it too.
  • application/vnd.ms-powerpoint. Do you use these presentations as a teaching aid? How useful would it be that alternate language versions were available?

Local servers

There is just the one server right now. It would be useful to have several around the world, with replication between them, leaving software clients to work out which gives best service.

Security

Security cannot be taken too seriously. I would commit to:

  • Private analysis. Were there funds to do so, I'd contract someone to Blue Team the existing security. I've done the best I can, but I doubt that's enough. Blue Teaming would happen regularly.
  • Public analysis. Under strict conditions of course I'd offer up a server on a private network that the 3rd parties could Red Team over the Internet. The kind of conditions I'm thinking of include:
    • All attacks must be made from machine A which is available over the Internet
    • All attacks must be against server B which machine A can reach over a private network
    • DoS or attacking A doesn't count.