Tor 7, Designing Depth, And Mac Ransomare – Smashing Magazine

webberoDesign0 Comments

Smashing Conf New York

You know, we use ad-blockers as well.
We gotta keep those servers running though. Did you know that we publish
useful books and run
friendly conferences — crafted for pros like yourself?
E.g. our upcoming SmashingConf New York, dedicated to smart front-end
techniques and design patterns.

Design is one of the most controversial things in our industry. There are barely any redesigns that aren’t discussed heavily in the community. Changing a well-working design is even harder as people tend to dislike anything new, but if we give them a bit of time, they might start to see things from a different perspective.

Instead of following what everyone else is doing, we shouldn’t hesitate to leave the beaten tracks when designing — by creating a contrast-rich, deep design without using drop shadows, for example. Whatever you do, be sure to explore new options whenever you can.

Further Reading on SmashingMag: Link

News Link

  • Chrome 60 beta is available5 and brings us the Paint Timing API, CSS’ font-display property, the Web Budget API, and Credential Management API improvements.
  • Firefox 54 is out6 — and, thanks to a new multi-process architecture, with huge performance improvements. The update also brings7 us the new Web Extension APIs as well as CSS clip-path improvements with basic shapes.
  • A new version of Tor Browser was released, too: Tor Browser 7.08. The new version is based on Firefox 52 ESR and, thus, has multi-process mode and sandboxing on Linux and macOS (Windows coming soon) enabled.
Firefox Multi-Process Architecture9
Its new multi-process architecture10 allows Firefox to run many simultaneous content processes in addition to a UI process. (Image credit11)

Concept & Design Link

Designing Depth14
Designing depth without any drop shadows? Scott Jensen shows how you can do it15. (Image credit16)

Security Link

  • Patrick Wardle found evidence that there’s a macOS ransomware spreading and wrote up the key facts about it17. This shows that the Mac platform is growing and attackers start targeting users as well. Better be safe and have a valid, usable backup.

Work & Life Link


  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

↑ Back to top

Tweet itShare on Facebook

is a freelance front-end developer and architect and cares about sustainable front-end experiences and ethical choices in life. He curates the WDRL, a weekly handcrafted web development newsletter that thousands of developers love, subscribe to, and donate for.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *