Forwarding to dev-tech-crypto where this is more on-topic.

-Dan Veditz
--- Begin Message ---
NSS was designed when physically distributed smart cards were anticipated to 
become the norm.

This didn't really happen but instead we got mobile devices with support for 
TEEs (Trusted Execution Environments):
http://webpki.org/papers/SKS-KeyGen2_FullStack.pdf

NSS cannot deal with provisioning of TEEs because it doesn't support 
provisioning of keys in an E2ES (End-To-End-Security) fashion.  This is hardly 
surprising since <keygen> was designed 1995.

In addition we need entirely new key access protection models:
http://webpki.org/papers/key-access.pdf

With a new key-system you could do things like:
https://mobilepki.org/WebCryptoPlusPlus

There's much more to this but I wanted to hear what Mozilla are thinking 
regarding key-storage.

I'm prepared to help making this upgrade possible!

Cheers,
Anders Rundgren
_______________________________________________
dev-security mailing list
dev-secur...@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

--- End Message ---
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to