Why should any comic artist make his or her art more copyable and abusable?
Art is intended to be seen, and if you can see it, you can copy it.
This has been going on for centuries:
https://en.wikipedia.org/wiki/Camera_obscura
The only way to prevent copying is to produce media that can’t be seen, read, heard, played, or watched.
Not what you’re looking for, but perhaps also interesting, there’s a comic written in CSS: https://comicss.art/
And yet it publishes in a bitmap format (webp). I can understand why, but still…
This is an interesting request. Why are you looking for this specific type of web comic?
Probably trying to steal them to train an AI model to produce his own webcomic LMAO
My guess exactly.
I would appreciate more vector formatted content. Nice to have that effectively infinite resolution.
I dont get the transparent png angle though.
I just like this formats compared to other formats and would like to archive them offline.
Dumbing of Age uses PNGs with transparent backgrounds for most strips.
I can’t think of anyone who publishes comics as SVG, but I wouldn’t be surprised if someone out there does it…
Thank you a lot. I am gonna check this out.
YSK: SVG files are a security risk. Be careful where you get them from and how you handle them.
Basically, an SVG can contain JavaScript. If you open an SVG in an application that can interpret the JS (e.g. a web browser) then the script will execute (just as with a malicious PDF), at which point it could download other files (malware) or perform any other function that the application has access to (creating, editing or deleting files on the hard drive) because you gave it permission to do that by opening the SVG. Effectively opening an SVG in a JS-capable application is the same as allowing a stranger to run arbitrary code on your computer. You might as well go around the Internet wearing a “please hack me” sign.
Downloading an SVG to your hard drive directly should be relatively safe, and opening it in a graphics program that does not execute JavaScript should have no risk, but viewing random SVGs in a web browser is a real hazard.
Effectively opening an SVG in a JS-capable application is the same as allowing a stranger to run arbitrary code on your computer.
If your browser allows JS access or create random files, or do other arbitrary stuff, that’s an extremely shit browser.
It also doesn’t exist because no one worked for months or years on a browser to literally make it less secure
Eh, we had ActiveX objects and Flash at one time… ActiveX is apparently still supported by Edge in the ‘IE mode’.
This is a bit like claiming cobol is still relevant because technically it’s still being used in production by some companies…
Is the statement “no one worked for months or years on a browser to literally make it less secure” true?
Also, some Lemmy users might use various newfangled alternative or experimental browsers.
How is the JavaScript in a svg different than the JavaScript in every web page on the Internet that makes it a security risk?
Oh, it’s not, the difference is that the SVG is an unexpected delivery vector.
The script on a website might change over time, might be blocked by an extension like uBlock origin that prevents sections of web code from loading in the first place. You can block a website’s JS with an extension that specifically does that, like jshelter. A malicious SVG is static, the malicious code is malicious forever and is embedded in the file. A browser extension can’t selectively block pieces of the file from loading.
Script blocking extensions prevent web page code from loading, but they don’t prevent the application from executing JS. If you open an SVG, the file is downloaded locally (it’s not web code) and the JS in the file will execute locally, with the same permissions and file system access as the user opening the file.
Literally identical. Pretty puzzled what op is smoking. Unless they disable JavaScript entirely, and in that case ain’t nobody got time for dat.
Isn’t opening it in a web browser same as opening random website?
Yes, and the security risks associated with JavaScript are not typically seen as significant since your filesystem is not accessible and most any other vulnerable data isn’t either for that matter
the security risks associated with JavaScript are not typically seen as significant since your filesystem is not accessible and most any other vulnerable data isn’t either for that matter
go on mate, pull the other one!
Rowhammer is unfixable, by the way, until someone invents a replacement for DRAM.
There’s some weird exception to pretty much any statement. Funny enough though
which had made Rowhammer impractically slow against web browsers.
Do you disable JavaScript across the board? Otherwise you’re not making much sense here.
Yes, actually I use jshelter to block script and selectively allow it per website.
SVGs are everywhere nowadays, from website logos, to UI elements to even the favicon.
Yup.
There’s always value in understanding risk, and in limiting it.
I like to use this to strip out unnecessary layers and optimise: https://svgomg.net/








