/
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
PayGate
CTO, CISSP
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
===
PayGate Inc.
THE STANDARD FOR ONLINE PAYMENT
list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
PayGate
CTO, CISSP
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
===
PayGate Inc.
THE STANDARD FOR ONLINE PAYMENT
for Korea, Japan, China
TLSv1.1+ environment.
as we know, it is just now opened from box.
regards
mountie.
On Tue, Oct 8, 2013 at 3:56 AM, Brian Smith br...@briansmith.org wrote:
Mountie Lee moun...@paygate.net wrote:
SEED was adopted to encourage escaping ActiveX dependency in Korea
e-commerce environment.
Many
://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
PayGate
CTO, CISSP
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
===
PayGate Inc.
THE STANDARD FOR ONLINE PAYMENT
for Korea, Japan, China, and the World
--
dev-tech-crypto mailing list
dev-tech
is already set default on
Mobile Safari is already set default on
Mac Safari is plan to set default on after version 7
any other reason disabled by default for TLS 1.1 (which need SHA2)?
regards
mountie.
--
Mountie Lee
PayGate
CTO, CISSP
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
.
regards
mountie.
On Wed, Oct 2, 2013 at 6:15 PM, Mountie Lee moun...@paygate.net wrote:
Hi.
let me add my comment for SEED.
SEED was adopted to encourage escaping ActiveX dependency in Korea
e-commerce environment.
the impact of mozilla's effort was not figured out well.
but it has meaning
.creation.net/webcrypto-api/
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
PayGate
CTO, CISSP
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
===
PayGate Inc.
THE STANDARD
mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
===
PayGate Inc.
THE STANDARD FOR ONLINE PAYMENT
for Korea, Japan, China, and the World
--
dev
Hi.
I'm mountie lee from paygate, seoul.
I have some question for firefox browser sandbox security.
I'm not sure this mailling list is suitable for my subject.
If not, recommend me the new group
anyway
my questions are
currently the sandbox security is just focusing to protect from outbound
://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
Twitter : mountielee
===
PayGate Inc.
* WEB STANDARD PAYMENT
* PCI DSS v1.2 COMPLIANT
* www.paygate.net
* payg...@paygate.net
--
dev-tech-crypto mailing list
was imported from outside.
If we can not use hardware token, the un-exportable private key can be
alternative security solution I think.
regards.
mountie.
--
Mountie Lee
Tel : +82 2 2140 2700
E-Mail : moun...@paygate.net
Twitter : mountielee
===
PayGate Inc.
* WEB
eddy_n...@startcom.org wrote:
On 04/08/2010 01:41 PM, Mountie Lee:
Hi.
I'm Mountie.
Hi Mountie...
in Firefox
is it possible to make private key in keystore as un-exportable that the
key was imported from outside.
Did you try to activate FIPS mode? See Preferences - Advanced - Security
Hi.
On Fri, Apr 9, 2010 at 2:08 AM, Nelson B Bolyard nel...@bolyard.me wrote:
Mountie Lee wrote:
Thanks Eddy.
in IE
the service provider can choose the private key can be exportable or
not.
the manual configuration is not so attractive for service provider.
On 2010-04-08 04:14
to this issue.
CKA_EXTRACTABLE: this is what Mountie Lee asked about. Keys with
this attribute set to false cannot be exported in either plaintext or
wrapped
(encrypted) form.
I agree that extractable is the attribute that most closely resembles the
attribute supplied in Microsoft CSPs
arbitrary certs without the superior CA
noticing it. IMO this could not even be discovered by audits if someone
would
want to hide bad activity.
Ciao, Michael.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
--
Mountie Lee
Hi.
sha256 certificate means
client certificate using sha256 for ssl client authentication.
regards.
mountie.
2010/3/20 Hanno Böck ha...@hboeck.de
Am Freitag 19 März 2010 schrieb Mountie Lee:
May I ask Firefox has plan to support SHA256 in near future or
URL link for discussion thread?
I
hi.
I read the thread #542441.
that is about mime type handling in firefox.
and has no relation with my question.
On Fri, Mar 19, 2010 at 4:09 PM, Gen Kanai gka...@gmail.com wrote:
On 3/19/10 3:37 PM, Nelson B Bolyard wrote:
On 2010/03/18 19:55 PST, Mountie Lee wrote:
Hi. all. I'm
-Teh Chang w...@google.com wrote:
On Fri, Mar 19, 2010 at 6:50 PM, Wan-Teh Chang w...@google.com wrote:
2010/3/19 Mountie Lee moun...@paygate.net:
Hi.
sha256 certificate means
client certificate using sha256 for ssl client authentication.
If you mean the signature in the TLS/SSL
Hi. all.
I'm Mountie Lee of PayGate, Korea.
in Korea, National PKI is becoming big issue maker.
one of good considerations is
storing National Certificate to Browser KeyStore.
also KISA has planned to upgrade certificate specification using SHA256 hash
algorithm in next year.
but current firefox
. If it truly doesn't than that
sounds like a pretty bad bug.
2010/3/18 Mountie Lee moun...@paygate.net:
Hi. all.
I'm Mountie Lee of PayGate, Korea.
in Korea, National PKI is becoming big issue maker.
one of good considerations is
storing National Certificate to Browser KeyStore.
also
20 matches
Mail list logo