- From: Mark Foltz \(Google\) via GitHub <sysbot+gh@w3.org>
- Date: Fri, 06 Sep 2019 18:30:48 +0000
- To: public-webscreens@w3.org
- We should be clear in the security analysis/implementation notes that the PSK should have N bits of true entropy from a secure RNG where N was negotiated as described in the PR. - I opened Issue #210 for translating the PSK into a numeric or QR code. There may be a reason for the PSK presenter to add a non-random salt for presentation, but that won't affect the code actually used in the SPAKE2 handshake. -- GitHub Notification of comment by mfoltzgoogle Please view or discuss this issue at https://github.com/webscreens/openscreenprotocol/pull/208#issuecomment-528965142 using your GitHub account
Received on Friday, 6 September 2019 18:30:50 UTC