m (Reverted edits by 94.233.241.205 (talk) to last revision by Themirrazz) Tags: Replaced Rollback |
m (→Known Glitches) |
||
Line 1: | Line 1: | ||
A Dynamic Wallpaper is a special JSON-based wallpaper format for moving wallpapers. A dynamic wallpaper file (DWP) is a JSON object with the properties `name`, `author`, `url`, and `properties` properties (sounds weird to say "properties properties"). Dynamic Wallpapers were introduced with the release of [[Windows 96 v2]] Service Pack 1. | A Dynamic Wallpaper is a special JSON-based wallpaper format for moving wallpapers. A dynamic wallpaper file (DWP) is a JSON object with the properties `name`, `author`, `url`, and `properties` properties (sounds weird to say "properties properties"). Dynamic Wallpapers were introduced with the release of [[Windows 96 v2]] Service Pack 1. | ||
This is the contents of the DWP file for the Cloud Animated wallpaper | ''This is the contents of the DWP file for the Cloud Animated wallpaper:'' | ||
<syntaxhighlight lang="json"> | <syntaxhighlight lang="json"> | ||
{ | { | ||
Line 10: | Line 10: | ||
} | } | ||
</syntaxhighlight> | </syntaxhighlight> | ||
== Documentation == | == Documentation == | ||
Line 24: | Line 22: | ||
== Known Glitches == | == Known Glitches == | ||
Dynamic Wallpaper also uses iFrames to display content (just like | Dynamic Wallpaper also uses iFrames to display content (just like [[InternetE]]). | ||
Most browsers allow javascript: URLs to run inside an iFrame. When javascript: URLs are run in an iFrame, they are treated as same-origin (just like about:blank). This means users can get infected with malware from applying DWPs or even just previewing them. The JavaScript code could also show an actual wallpaper while secretly corrupting files, adding boot scripts, replacing the shell, adding a custom kernel, and running other malicious processes. | Most browsers allow javascript: URLs to run inside an iFrame. When javascript: URLs are run in an iFrame, they are treated as same-origin (just like about:blank). This means users can get infected with malware from applying DWPs or even just previewing them. The JavaScript code could also show an actual wallpaper while secretly corrupting files, adding boot scripts, replacing the shell, adding a custom kernel, and running other malicious processes. |
Latest revision as of 21:00, 11 July 2023
A Dynamic Wallpaper is a special JSON-based wallpaper format for moving wallpapers. A dynamic wallpaper file (DWP) is a JSON object with the properties `name`, `author`, `url`, and `properties` properties (sounds weird to say "properties properties"). Dynamic Wallpapers were introduced with the release of Windows 96 v2 Service Pack 1.
This is the contents of the DWP file for the Cloud Animated wallpaper:
{
"name": "Cloudy Animated",
"author": "litevx",
"url": "/system/resource/dwp/clouds/index.html",
"properties": {}
}
Documentation
name: The name of the animated wallpaper
author: The name of the person who created the wallpaper
url: The web page the wallpaper is located at
properties: An empty object, unknown what it is for.
Known Glitches
Dynamic Wallpaper also uses iFrames to display content (just like InternetE).
Most browsers allow javascript: URLs to run inside an iFrame. When javascript: URLs are run in an iFrame, they are treated as same-origin (just like about:blank). This means users can get infected with malware from applying DWPs or even just previewing them. The JavaScript code could also show an actual wallpaper while secretly corrupting files, adding boot scripts, replacing the shell, adding a custom kernel, and running other malicious processes.