On 2012-04-09 12:13, helpcrypto helpcrypto wrote:
>> http://www.w3.org/2011/11/webcryptography-charter.html
> 
> BSmith ans RRelyea directed me there also. All fishes go to sea... ;)

The really big fishes (Google, Apple, and Microsoft) haven't said a word
(in public) about their interest in this.  I think they have reasons to
wait for Mozilla to release their signature solution...


>>    http://webpki.org/papers/wasp/wasp-tutorial.pdf
>> http://webpki.org/papers/keygen2/sks-keygen2-exec-level-presentation.pdf
> 
> I think i already read both documents some time ago.

Isn't the inferiority of the soft token implementations a problem?

In Sweden, banks rejected these since PIN-code protection isn't controllable.
They opted for PKCS #12 containers protected by 12-character passphrases.
Pretty inconvenient but what else could they possible do?

Related: The IETF has recently started the development of yet another
PKI enrollment scheme that doesn't support PIN-code provisioning!

Anders

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to