On 20 Jul., 12:04, Ian G <i...@iang.org> wrote:
> On 20/7/09 09:18, Udo Puetz wrote:
>
> > <rant mode> From a usability point of view I would consider the WHOLE
> > thing to be a nightmare. I intended to write up a howto, gave that up
> > now for the time being.
> > And by the way: ASN1, PKCS#7, PKCS#12. Who was the (pardon my french)
> > braindead person to name these things? I could probably learn the
> > difference (I know lots of other 3-4 letter acronyms) but guess what I
> > hear when I try to remote-debug a call from a luser when I tell them
> > to give me the PKCS#12 cert...?</rant mode>
> > Anyway, thanks for your efforts, I consider the whole thing for the
> > time being as not usable and recommendable.
>
> This is a lesson that all users find and repeat.  Smart cards / tokens
> are unusable in the general market.
>
> The causes are a bit complex, but basically Mozilla champions the smart
> card / token method of storing PKI keys because companies can sell it to
> other companies, and companies provide the developers in this area.
>
> Mozilla does not, and no other developers are "available".
>
> The fact that hardware doesn't work in the retail / open / end-user
> market which Mozilla is most famous for is more than annoying.  It
> creates a dead weight "opportunity cost".  The solutions in the end-user
> market do not use hardware, and won't be implemented if they clash with
> the precious hardware model.  So the end user is screwed again.

Due to recent developments (US agencies spying on it's citizens,
retention laws in germany and elsewhere, facebook, twitter and such
becoming popular) people in the internet can be devided into two
groups roughly.
Those that give away ANY information about themselves for, well,
nothing.
And those that think about the implications of using google services
and such because of the implicit data they give away.
The first ones might convert if they get bitten by their openness
(fired because of a facebook entry etc.).
IF you want to do encryption (e.g. online banking) you fast realise
that you need two (or more) factor authentication. And one of those is
a hardware dongle because the rest is in your head or in your
biometrics.
Sooo, more and more people WANT to use hardware tokens (also because
they are fairly cheap nowadays).
So there is a very substancial market there.
On "paper" it also looks as if quite a lot of devices are supported.
opensc has a list of devices that "work" and you get windows drivers
with every hardware you purchase.
Why isn't there more focus on underlying structures?
It's all nice and such if the url bar get's green if the SSL cert is
"valid" (wasn't a SSL cert forged recently because MD5 has
collisions?), but it's bad if thunderbird thinks an email is signed
when it isn't.
I dunno if I bark up the wrong tree  here but it needed to be said ;-)
And I think that mozilla has the knowledge (you guys), the ressources
and the mental state to work on such a thing - even if other browsers
would also benefit from this work.
Regards
Udo Puetz

> iang

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to