Martin Paljak wrote:
> [2] https://wiki.mozilla.org/NSS_Shared_DB

I didn't realize that NSS was SO crappy. :(

Anyway, SoftHSM does this; it's a soft p11 using SQLite for backing
storage. BSD licensed, developed by the OpenDNSSEC project.

DNS with DNSSEC is also interesting in the scope of FOSS crypto, well
crypto in generally really. If DNS can be trusted then we also have
to consider a network-scale distributed key store.


> [3] http://fedoraproject.org/wiki/FedoraCryptoConsolidation

"we will be using the NSS crypto libraries. NSS has been awarded FIPS
140 certificates four times" - yes of course, because it has the most
crappy technical internals possible. :) It's easier to hack NSS than
to hack the government requirements of course.

"we're going to rely on NSS for smart card support, hardware security
modules (HSM) support for SSL acceleration and key protection,
S/MIME, and OCSP support"

It'll be interesting (no) to see OpenSSH become NSS-enabled..

I understand the Fedora move completely. though.


> [4] http://www.opensc-project.org/opensc/wiki/FOSDEM2011

Short slogans are better. I suggest simply "Protect your privates"

Distributing flyers and/or giveaways at the entrance is nice. Note
that the campus has entrances from two directions, the main road in
the south and the tram in the north. I actually never went to the
main building until the end of Sunday last year. There are so many
people and projects to meet.


//Peter
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to