On 2015-03-29 17:31, Siva Narendra wrote:
Dead-end because the data used to arrive are myths and are grossly inaccurate.
> See my presentation from the workshop:
> 
http://www.w3.org/2012/webcrypto/webcrypto-next-workshop/slides/hardwaretokens/tyfone.pdf

Dear Siva,

The first part of your presentation which shows HTTPS CCA (Client Certificate 
Authentication)
works fine because it builds on what I call "Trusted Code".  Due to that it 
doesn't even
have to honor SOP!  The whole HTTPS CCA engine and UI is a part of the trusted 
platform.

Transiently downloaded web-code doesn't meet this criterion.

Therefore I have suggested a way to address this problem as well as a bunch of 
other equally
difficult topics.  I haven't received a single comment or question on that 
which either means
that the proposal is "unintelligible", completely broken, or something else.

Cheers,
Anders

https://cyberphone.github.io/openkeystore/resources/docs/web2native-bridge.pdf


On Mar 29, 2015 8:26 AM, "Anders Rundgren" <anders.rundgren....@gmail.com 
<mailto:anders.rundgren....@gmail.com>> wrote:

    On 2015-03-29 17:11, Rigo Wenning wrote:

        
http://pomcor.com/2015/03/24/__highlights-of-the-nist-__worshop-on-piv-related-__special-publications/
 
<http://pomcor.com/2015/03/24/highlights-of-the-nist-worshop-on-piv-related-special-publications/>

        Interesting to see that they use NFC for Personal Identity Verification 
to
        connect to smart cards. Meanwhile W3C has hard times finding support 
for the
        work on NFC and the connection to smart cards.. Will it be impossible to
        connect the NIS work to the Web?


    No it is actually quite doable but the method once thought (even by me...) as 
"the solution" turned out to be a dead-end.

    The interest in discussing alternatives routes to the same goal seems to be 
rather limited.

    Anders



           --Rigo





Reply via email to