This could easily be built into the Cryptographic Services service or
something -- if it's code that comes from the vendor, it's easier to
trust than code that doesn't.

The problem is the addition of another attack vector, and having to
authenticate to it (unless the process can look at the TCP connection
list and see what process opened it, then get the credentials of that
process to see who it's supposed to impersonate).  This could be
mitigated by having it only listen on 127.0.0.1 on some strange port,
but it's still not that great.

I would rather have another virtual machine entirely running on the
same hardware, but that's something of a pipe dream.

-Kyle H

On 2/13/06, Anders Rundgren <[EMAIL PROTECTED]> wrote:
> http://opensignature.sourceforge.net/english.php
>
> These guys have concluded that Java applets are bad and that you
> should exclude the browser altogether by using something called
> URL Programming Interface, which in essens hosts a local web-server
> for handling the crypto and signature stuff.
>
> I believe this is similar to the Austrian scheme, although a bit less 
> documented.
>
> Personally I think Java is good as a short-term solution but useless in
> the long-run as Microsoft would never support a Java-based standard.
> The need for accepting native and trusted code during browsing is also
> something that does not seem to be ideal.
>
> Anders R
>
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to