Skip to content

Recursive Ordinals are blocked and not functional for display on Safari and Safari & Chrome & Imbeded browsers on iOS #2229

@Xen0ph0n

Description

@Xen0ph0n

Due to incompatibility with Safari and apples CSP policy recursive ordinals do not function at all on roughly 40% of the mobile market. This is a hard block to which we've been unable to find a successful work around.

This issue was mentioned prior to recursion release with regards to Safari (OSX) however this is the case in all browsers on iOS which makes up the a good portion of internet traffic globally, albiet currently there are few ordinal wallets or websites geared towards mobile.

This means all the recursive ordinals sold thus far, or in the future utilizing the current protocol standards may/will fail to render as expected for the majority of owners or platforms.

Example:

https://ordinals.com/content/821006d94ecbe675dcb6bcb911a6e55c0fc3015f57b64ef366c84899ff8a7a20i0 Refused to load because it appears in neither the img-src directive nor the default-src directive of the Content Security Policy.

We have tested this on multiple recursive ordinals from both ordinals.com and the magiceden content mirror during testing of recursion for project and artist usage.

Examples of testing include basic recursion such as recursive frogs: (Simply layering)
https://ord-mirror.magiceden.dev/content/3e0838c4e814f7ed88ef932e09ae56a5b6627dbfed89ee8ba160edcdb527b303i0

And more complex which pulls in libraries to display images: (rotating 3d gallery)
https://ordinals.com/content/0829ab0e3a096e37604a52a08acbf343146fe4daa4469f54408a19e10e5a5917i0

Images below.. note this is the case on ordinals.com and magiceden and other sites which implement protocol correct security policies.

Given the issue with CSPs was presented prior to release, this is likely not news with regards to safari incompatibility, but iOS broadly renders recursion non operable for the majority of users, and projects selling or users buying recursive ordinals need to understand these current limitations.

Apples CSP policy is not likely to change, and is secure, if anything it is likely to propagate to other browsers over time.

![IMG_7AC4C94C7D78-1](https://github.com/ordinals/ord/assets/2313682/b3cbd193-e95b-41f0-a99d-13d44145412e) ![IMG_0044](https://github.com/ordinals/ord/assets/2313682/a9f10d50-a92d-4fe4-ae67-ff66eeb4e6c7) ![IMG_0045](https://github.com/ordinals/ord/assets/2313682/254bbbf1-f896-4fe9-ab0b-abc87c28686f) ![IMG_0046](https://github.com/ordinals/ord/assets/2313682/1a810d19-22c2-4296-9674-e61cd7e3d6e5) ![IMG_0048](https://github.com/ordinals/ord/assets/2313682/751b6280-5706-4ff3-a270-6f6bae0af36d)

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions