-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 03/07/2015 01:20 AM, Paul Theriault wrote: > In general I think the next step here is to flesh out what some of > these services might do? I'm struggling to think of actual > services that would support gaia use cases in a safe way but its > probably worth exploring, if only to better understand the APIs we > need for gaia. Paul and I were discussing this in the context of the proposed crypto-ish hardware framework. I'm replying here to get some more eyes on what we discussed. Using apps to provide services via IAC of some form is a good approach to adding support for crypto-ish hardware (e.g. secure elements, yubikeys, hardware bitcoin wallets, hardware entropy sources, etc). What I'd like to see is crypto-ish hardware manufacturers creating signed apps that we can grant access to restricted APIs for talking to their hardware (i.e. Yubico writes a signed Yubikey app that gets access to their hardware and can respond to IAC requests from other apps ). This avoids having to figure out how to give 3rd party apps direct access to the hardware. It puts the responsibility of supporting a piece of hardware into the hands of the manufacturer. It allows for supporting a multiplicity of crypto-ish hardware without having a specific API for each one. I'm currently attempting to build a prototype certified app that will access a Secure Element and respond to IAC requests from other certified apps. Some of the prototype use cases we've thought of are: 1. Storing an encryption key on the Secure Element and using it to encrypt/decrypt email credentials so that we no longer store them in the clear. 2. Creating a generic key store Secure Element applet and allowing other apps to generate and store the keys on the Secure Element instead of on the flash. 3. Implementing a shared secret + time one-time-password applet for the Secure Element and using that for two-factor auth. Ultimately, I want 3rd-party apps to be able to talk to the service apps, but for now I'm just trying to prove that this is viable for certified apps. WDYT? - --dave -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJVEKxNAAoJEJ7v31qiCP4gYuwP/RAaP5Kmxvdfv2+7v/oQmuuB zfuE5aP3y2iC1l2/cNoI8HYFJMu5rRVmpo01kkjI8lWMM6Dm1NM4FQ83R6LzT/bi KnglxQd4roPpx2xUUOMJiqAjjz7kSbM+D1stisuQkzABWI4zgDl9wth8zzS3+57Z /FPY7euO+d22ieEAPBX8HhWMmbdDcNebbBtm1QbZbO6O2FrG49fIh2zENKg9Udvq M09J+iaOSVE7fwqBj6IBPo0Uxk3RvSLR1ADsQmw8KhfVq0aOkHTXoPfgrf/F+xK1 +iSqZWZL0mcMM9wLEW35LBndPDtgg6Z0OPW82CWTYBu6KJSkjSgnBmX7URQFqXTe hYYH5IpcV4B02/fsrF6HAQEk6B+P5lksGjI1jbsd4J3JrgyfjrqPoPpy3dgYbp/l bjyFNqdV1P3RnqBzgSXeffi/Yqaoc66YEr9BFYrWIU2PhhJWMDQRo4cs2eAT6agd zQj/cpc5XIr7ETITxKgRQEHyE21xTnMEVxbwtu9p64Y9W8EWwX+LyXT6EAfQT3sq H0cOeu9EWRKOBMi+fOeb7VCdM6h6KZpkoLa5D4IIfBw1YjEyXsbt/mTKkM55Z4jO gffqWtIKjxZhAPEU7+nkeWdWv6taGNyWgqAgpfWxDQaKzFfw64qOAgCrTnWcane/ mZ1Rv3YaG26T6RPtUfl6 =PNHk -----END PGP SIGNATURE----- _______________________________________________ dev-b2g mailing list [email protected] https://lists.mozilla.org/listinfo/dev-b2g
