Can this be somewhat solved with a handshake? You get the request at the 
server, respond with data that needs a particularly nasty piece of 
manipulation, and then you compare the response with your computed response for 
a match? You're not storing anything on the client side except code.  It's 
still "security by obscurity", but Mr Frouma would have to steal your algorithm 
from your client and put it in his app, perhaps harder than stealing a blob of 
data. There are probably enhancements you could make if you can verify the 
client, such as pushing out a new algorithm.

Phil Wilson


-----Original Message-----
From: Discussion of advanced .NET topics. [mailto:[EMAIL PROTECTED] On Behalf 
Of Per Bolmstedt
Sent: Friday, March 28, 2008 11:11 AM
To: ADVANCED-DOTNET@DISCUSS.DEVELOP.COM
Subject: Re: [ADVANCED-DOTNET] Storing shared secrets

On Fri, 28 Mar 2008 19:09:52 +0100, Frans Bouma <[EMAIL PROTECTED]> wrote:

>> What you don't want: the key used for signing is available to anyone who
>> installs your client, so Bans Frouma can get at it and use it in his Pi
>> Komputing Klient.
>
> So that's a typical client-side certificate SSL connection. THe TS
> should read into that how that's done with public/private keypairs.

Even so, the private key used to decrypt messages from the Pi Computing
Service (and sign messages to it) has to be accessible to the client, right?

===================================
This list is hosted by DevelopMentor(r)  http://www.develop.com

View archives and manage your subscription(s) at http://discuss.develop.com

===================================
This list is hosted by DevelopMentorĀ®  http://www.develop.com

View archives and manage your subscription(s) at http://discuss.develop.com

Reply via email to