"Signed high-value transactions"

Given the somewhat hard-to-follow discussions on the public-webcrypto list, I think the time has come to outline how applications like the subject line should be architected and what kind of vulnerabilities they would have (in contrast to statically installed applications).

I would also like to see a concrete proposal for accessing existing keys based on system-wide cryptographic sub-systems like featured in Windows and Android.

Although Ryan is the lead editor, it can hardly be his task to do all the work or respond to every question, right?

Anders

Received on Thursday, 11 October 2012 14:47:00 UTC