Martin Paljak wrote: > [2] https://wiki.mozilla.org/NSS_Shared_DB
I didn't realize that NSS was SO crappy. :( Anyway, SoftHSM does this; it's a soft p11 using SQLite for backing storage. BSD licensed, developed by the OpenDNSSEC project. DNS with DNSSEC is also interesting in the scope of FOSS crypto, well crypto in generally really. If DNS can be trusted then we also have to consider a network-scale distributed key store. > [3] http://fedoraproject.org/wiki/FedoraCryptoConsolidation "we will be using the NSS crypto libraries. NSS has been awarded FIPS 140 certificates four times" - yes of course, because it has the most crappy technical internals possible. :) It's easier to hack NSS than to hack the government requirements of course. "we're going to rely on NSS for smart card support, hardware security modules (HSM) support for SSL acceleration and key protection, S/MIME, and OCSP support" It'll be interesting (no) to see OpenSSH become NSS-enabled.. I understand the Fedora move completely. though. > [4] http://www.opensc-project.org/opensc/wiki/FOSDEM2011 Short slogans are better. I suggest simply "Protect your privates" Distributing flyers and/or giveaways at the entrance is nice. Note that the campus has entrances from two directions, the main road in the south and the tram in the north. I actually never went to the main building until the end of Sunday last year. There are so many people and projects to meet. //Peter _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel