- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Sun, 20 Jul 2014 22:41:57 -0400
- To: public-webid@w3.org
- Message-ID: <53CC7DF5.50207@openlinksw.com>
On 7/20/14 9:45 AM, Anders Rundgren wrote: > On 2014-07-20 15:35, henry.story@bblfish.net wrote: >> >> On 20 Jul 2014, at 15:16, Anders Rundgren >> <anders.rundgren.net@gmail.com> wrote: >> >>> Google scrapped established standards such as TLS CCA, ASN.1, PKCS #10, >>> <keygen> and still got the entire industry (modulo Apple) backing them. >> >> keygen works fine for me on Chrome. Good developers work around >> problems, they >> don't just complain. > > I'm not entirely alone: > http://lists.w3.org/Archives/Public/public-html/2009Sep/0043.html > > Naturally, Microsoft haven't published anything on what *they* > consider the right solution. > > Anders As I've already indicated to you in a prior post, Microsoft and Apple provide native keystores which developers interact with via APIs. That's what Chrome does on both Windows and Mac OS X, for instance. The only issue with Chrome right now is that it doesn't use the keychain API in the same manner as Safari. Once that's fixed, as I've told you many times before, the TLS CCA UI/UX issues re., Chrome will vaporize i.e., like Safari, Firefox, and IE it too will work fine with our TLS CCA UI/UX claims repudiation utility [1]. Links: [1] http://id.myopenlink.net/ods/webid_demo.html -- verify various WebIDs from IE, Safari, and Firefox without restarting any of the browsers (i.e., login and logout using different WebIDs) [2] http://youid.openlinksw.com -- an X.509 Certificate generator that supports WebIDs in cert. SANs while not producing artifacts that are subject to TLS CCA confusion (on the client), all the usual RDF notation distraction that swirl around Public Identity Cards, or covertly imposing Apace on you (Google Drive, Microsoft OneDrive, Dropbox, Box. etc.. are all at your disposal as Idps). -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog 1: http://kidehen.blogspot.com Personal Weblog 2: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen Personal WebID: http://kingsley.idehen.net/dataspace/person/kidehen#this
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Monday, 21 July 2014 02:42:20 UTC