- From: lisa.seeman <lisa.seeman@zoho.com>
- Date: Tue, 20 Jun 2017 05:02:26 +0300
- To: "Jason J White" <jjwhite@ets.org>
- Cc: "John Foliot" <john.foliot@deque.com>, "Gregg C Vanderheiden" <greggvan@umd.edu>, "Alastair Campbell" <acampbell@nomensa.com>, "public-cognitive-a11y-tf" <public-cognitive-a11y-tf@w3.org>, "W3c-Wai-Gl-Request@W3. Org" <w3c-wai-gl@w3.org>
- Message-Id: <15cc33ac06e.ca1ea4ff36880.4736100660639403814@zoho.com>
I am sorry if I gave the impression there is a triad off between accessibility and security. I see no traid off what so ever.What I said was people will pick the alternative based on their scenario and security needs. So whilst log in with Facebook is not very secure, it may be more then enough for some places, which are not very secure anyway. People who want a more secure solution can pick one of the many other solutions. But I think we can include it as a comformant technique.All the bestLisa SeemanLinkedIn, Twitter---- On Mon, 19 Jun 2017 22:47:48 +0300 White, Jason J<jjwhite@ets.org> wrote ---- From: John Foliot [mailto:john.foliot@deque.com] Sent: Monday, June 19, 2017 3:40 PM When I read what you just wrote, it appears to indicate that you believe there is a trade-off possible here between accessibility and security - that there is a balance question here that needs to be addressed at scale. There isn't such a balance, and I strongly suspect that at some level there never will be, certainly not for high-security situations such as banking and medical services (to name two critical / high-security situations). The closer we get to "ease of implementation", the easier it becomes to spoof or automate (hack) the required authentication task, which then weakens the security, not only for the individual user, but perhaps of an entire system - which no high-security application will accept at any cost. [Jason] I think John’s point is in line with what I wrote on the survey: the security implications not only affect the users individually (including people who may be especially vulnerable to the effects of security compromises), but also the integrity of larger systems – the Web server, its network, and other networks. It’s clear that the alternatives which Lisa mentioned are concentrated mostly toward the lower security end of the scale, leaving very little available at the high security end until there is a widely available Web Authentication specification in place, and hardware available to users which is both accessible and supportive of the standard. Now that may not be a problem, depending on the projected time-line of WCAG 2.1 implementation. In practical terms, we would need the solutions to be available in order to demonstrate interoperable WCAG 2.1 implementations at the Candidate Recommendation stage. I also think Gregg Vanderheiden is raising the right questions about the cognitive benefits of the proposal. This e-mail and any files transmitted with it may contain privileged or confidential information. It is solely for use by the individual for whom it is intended, even if addressed incorrectly. If you received this e-mail in error, please notify the sender; do not disclose, copy, distribute, or take any action in reliance on the contents of this information; and delete it from your system. Any other use of this e-mail is prohibited. Thank you for your compliance.
Received on Tuesday, 20 June 2017 02:03:03 UTC