<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: windowname</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/windowname.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-07-23T16:25:51+00:00</updated><author><name>Simon Willison</name></author><entry><title>window.name Transport</title><link href="https://simonwillison.net/2008/Jul/23/sitepen/#atom-tag" rel="alternate"/><published>2008-07-23T16:25:51+00:00</published><updated>2008-07-23T16:25:51+00:00</updated><id>https://simonwillison.net/2008/Jul/23/sitepen/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.sitepen.com/blog/2008/07/22/windowname-transport/"&gt;window.name Transport&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
The cleverest use of the window.name messaging hack I’ve seen yet: Dojo now has dojox.io.windowName.send for safe, performant cross-domain messaging.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/crossdomain"&gt;crossdomain&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/dojo"&gt;dojo&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/javascript"&gt;javascript&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/windowname"&gt;windowname&lt;/a&gt;&lt;/p&gt;



</summary><category term="crossdomain"/><category term="dojo"/><category term="javascript"/><category term="windowname"/></entry><entry><title>quipt</title><link href="https://simonwillison.net/2008/Jul/4/quipt/#atom-tag" rel="alternate"/><published>2008-07-04T15:49:58+00:00</published><updated>2008-07-04T15:49:58+00:00</updated><id>https://simonwillison.net/2008/Jul/4/quipt/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://code.google.com/p/quipt/"&gt;quipt&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Extremely clever idea: Cache JavaScript in window.name (which persists between page views and can hold several MB of data), but use document.referrer to check that an external domain hasn’t loaded the cache with malicious code for an XSS attack. UPDATE: Jesse Ruderman points out a fatal flaw in the comments.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://ajaxian.com/archives/quipt-caching-js-in-windowname"&gt;Ajaxian&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/caching"&gt;caching&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/javascript"&gt;javascript&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/optimisation"&gt;optimisation&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/quipt"&gt;quipt&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/referrer"&gt;referrer&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/windowname"&gt;windowname&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/xss"&gt;xss&lt;/a&gt;&lt;/p&gt;



</summary><category term="caching"/><category term="javascript"/><category term="optimisation"/><category term="quipt"/><category term="referrer"/><category term="security"/><category term="windowname"/><category term="xss"/></entry></feed>