- From: Nathan <nathan@webr3.org>
- Date: Mon, 22 Feb 2010 13:50:36 +0000
- To: Melvin Carvalho <melvincarvalho@gmail.com>
- CC: Linked Data community <public-lod@w3.org>, foaf-protocols@lists.foaf-project.org
Melvin Carvalho wrote: > CC: foaf-protocols > > On 22 February 2010 14:40, Nathan <nathan@webr3.org> wrote: > >> Hi All, >> >> As per the subject, I'm very tempted to store a base64 encoded versions >> of my PKCS#12 certificate store file inside my FOAF profile; this way at >> any point I can simply download it; decode it and pop it in whatever >> client browser I want; knowing that it can only be unlocked with the >> password only I know. >> >> Thoughts, Opinions? talked myself out of it; I'd leave my identity open to a brute force attack to crack the password; anybody could simply download my FOAF; base64_decode the pkcs#12 and then brute force it open.
Received on Monday, 22 February 2010 13:51:16 UTC