The permission descriptor for the allow-hrtime
and deny-hrtime
permissions, which
controls if the runtime code has access to high resolution time. High
resolution time is considered sensitive information, because it can be used
by malicious code to gain information about the host that it might not
otherwise have access to.
Latest
Canvas
I
v
I
T
T
T
T
T
f
Cloud
c
unstable
c
unstable
c
unstable
c
unstable
I
unstable
I
unstable
I
unstable
I
unstable
I
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
f
unstable
f
unstable
Crypto
I
I
I
I
I
I
I
I
v
I
v
I
v
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
v
T
T
T
T
T
T
v
Encoding
I
I
v
I
I
v
I
v
I
I
v
f
f
Errors
N
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
Events
I
I
v
I
I
v
I
I
v
I
I
I
I
I
v
I
v
I
I
v
I
I
v
I
T
T
T
v
v
v
v
v
f
f
f
Fetch
I
I
unstable
I
unstable
I
unstable
I
unstable
I
v
I
I
I
v
I
v
I
v
I
I
v
I
T
T
T
T
T
T
T
T
T
T
T
f
unstable
f
unstable
FFI
c
unstable
c
unstable
c
unstable
c
unstable
I
unstable
I
unstable
I
unstable
I
unstable
I
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
v
unstable
f
unstable
File System
c
I
I
I
I
I
I
I
I
I
I
I
T
v
f
f
f
f
f
f
f
f
f
f
f
unstable
f
unstable
f
f
f
f
f
f
f
unstable
f
unstable
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
unstable
f
f
f
f
f
f
f
GPU
c
unstable
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
HTTP Server
I
I
I
I
unstable
I
I
I
I
I
I
I
T
T
T
f
f
I/O
c
I
I
I
I
I
I
I
I
I
I
v
v
v
v
v
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
E
Intl
N
I
unstable
I
unstable
I
unstable
T
unstable
Jupyter
N
unstable
I
unstable
T
unstable
T
unstable
T
unstable
v
unstable
f
unstable
f
unstable
f
unstable
f
unstable
f
unstable
f
unstable
Messaging
I
v
I
I
v
I
v
I
Network
I
I
I
I
I
unstable
I
I
I
I
unstable
I
unstable
I
I
I
I
I
I
I
I
I
I
unstable
I
I
I
I
I
I
unstable
I
I
I
I
T
T
T
T
T
T
f
f
f
f
unstable
f
f
f
f
f
Performance
I
v
I
v
I
v
I
I
v
I
T
v
Permissions
c
c
I
I
I
I
I
I
I
I
I
I
T
T
T
T
v
Platform
I
v
I
v
I
I
I
v
I
I
I
I
I
v
unstable
I
I
I
v
I
I
I
v
I
v
I
I
I
v
I
T
T
v
v
v
v
v
v
f
f
f
f
f
f
f
f
f
f
f
Runtime
I
I
I
I
I
I
T
v
v
v
v
v
v
v
v
v
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
f
Streams
I
v
I
v
I
v
I
v
I
I
I
I
v
I
I
v
I
I
v
I
I
I
v
I
v
I
I
I
v
I
I
I
I
v
I
v
I
I
I
I
I
I
v
I
v
I
I
I
I
v
I
T
T
Sub Process
c
c
c
I
I
I
I
I
unstable
T
f
f
unstable
Temporal
N
c
unstable
c
unstable
c
unstable
c
unstable
c
unstable
c
unstable
c
unstable
c
unstable
c
unstable
c
unstable
I
I
unstable
I
unstable
I
unstable
I
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
T
unstable
v
unstable
Testing
I
I
I
I
I
I
v
f
URL
I
v
I
v
I
I
I
I
v
T
WASM
N
c
c
c
c
c
c
c
c
I
I
I
I
I
I
T
T
T
T
T
T
T
T
f
f
f
f
f
WebSockets
I
v
I
I
v
I
I
I
v
unstable
I
I
v
unstable
I
T
N