On Mon, Apr 9, 2012 at 6:16 PM, Anders Rundgren
<anders.rundg...@telia.com> wrote:
> On 2012-04-09 12:13, helpcrypto helpcrypto wrote:
>>> http://www.w3.org/2011/11/webcryptography-charter.html
>>
>> BSmith ans RRelyea directed me there also. All fishes go to sea... ;)
>
> The really big fishes (Google, Apple, and Microsoft) haven't said a word
> (in public) about their interest in this.  I think they have reasons to
> wait for Mozilla to release their signature solution...

Really? And the mozilla signature solution (apart from current NSS)
is/going to be...? shared nss db? the result of that wg?

>>>    http://webpki.org/papers/wasp/wasp-tutorial.pdf
>>> http://webpki.org/papers/keygen2/sks-keygen2-exec-level-presentation.pdf
>>
>> I think i already read both documents some time ago.
>
> Isn't the inferiority of the soft token implementations a problem?

Well...the real problem is thats not working as it should (IMHO). With
a few changes in the way its compiled +sqlite, nss will be greatly
improved.

> In Sweden, banks rejected these since PIN-code protection isn't controllable.
> They opted for PKCS #12 containers protected by 12-character passphrases.
> Pretty inconvenient but what else could they possible do?

Disagree. PKCS#12 is easier to crack than a crypto-card protected by
the simplest PIN.

> Related: The IETF has recently started the development of yet another
> PKI enrollment scheme that doesn't support PIN-code provisioning!

link?
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to