- From: Harry Halpin <hhalpin@w3.org>
- Date: Mon, 24 Sep 2012 22:44:39 +0200
- To: "public-webcrypto@w3.org" <public-webcrypto@w3.org>
Looking at various discussions about the Web Crypto API, it seems that most of the concern is the "footgun" problem, i.e. we are giving developers a gun to shot themselves in the foot. Most of the concern seems to be over the JS environment as a whole, but there is considerable concern over the larger issues related to the Web Security Model (i.e. CSP.). I'll draft some text on how the Web Crypto API only solves a limited part of the problem (i.e. primitives for re-implementing existing work, random number generation, key storage). However, it would behoof us by our next WD release to actually *address* these concerns. The primary concern seems to be having a high-level APIs (which would require pushing on the discovery algorithm). Thus, my suggestion is that we start at least collecting examples of good high-level APIs and comparing their functions, and see if we can get a clear consensus. These three come up off top of my head: 1) DOMCrypt - This is David Dahl, who is one of co-editors and a member of our WG. 2) Stanford Crypto API - Dan Boneh, Mike Hamburg, and Emily Stark (who is on our WG) 3) KeyCzar - this is Steve Weis/Ben Laurie from Google. Shall we ping them? @Rsleevi and @wtc? We could get a call devoted to this topic, and maybe invite some of the folks that aren't in our WG. I'd be happy to go for this next week unless we want to prioritze other issues! cheers, harry [1] https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest [2] http://crypto.stanford.edu/sjcl/ [3] http://www.keyczar.org/
Received on Monday, 24 September 2012 20:45:04 UTC