I don’t think so… I think each individual certificate needs to be accepted (and there’s an option for accepting a cert. in perpetuity).
What I was thinking was more along the lines of… Imagine Java as just the core plugin at the centre of an ecosystem of other plugin functionality. Such ecosystem might contain JavaFX, LWJGL, JOGL, JUnity, JFlash (hehe), etc. Rather like when you go to visit a website that requires a plugin you don’t have, you’re prompted about installing it (usually with some degree of hassle) - except in this case, the root of it all is Java, and it’s easy to install as a result. So these plugins are to all intents and purposes to be treated just like their “native” equivalents: that is, a user trusts the plugin, not Java itself, to maintain security. This is already the situation to some extent. What it means is that the onus of trust is on the plugin vendors, not Java, to keep themselves secure. For users, it means accepting a one-time installation of a little extension in their JVM but no further dialogs.
You’d still want to have the standard JDK enforce its standard security wrt. windows and so on as that’s built in to Java through and through. If a user wants to use an applet with an SWT plugin then it’s up to SWT to put up their own warning triangles.
To be honest though it should be down to the operating system to enforce security and sandboxing at this point. Vista does it ok.
It’s kinda like totally cross platform ActiveX with the attendant security worries I suppose, but the added benefits that certain things will become possible without any true security risk. It’s worth pointing out that the sorts of supremely dodgy “screen copying” applet behaviour and “identical to MSN Messenger login” behaviour applets are going to be found only on the sorts of sites where a fool and his money deserve to be parted. No-one with legitimate aim would host such an application.
Cas 