On 13/11/2014 12:19 pm, Hubert Kario wrote:
> On Saturday 08 November 2014 22:51:49 Anders Rundgren wrote:
>> On Friday, November 7, 2014 7:57:49 PM UTC+1, Mike Gerow wrote:
>>> The only issue is that ...
>> Mozilla's key architecture was essentially created 1995 (by Netscape).
>> Improving it would be a waste of time and resources, it must be rebuilt
>> from scratch
>
> Linux kernel was created even earlier, and yet you can run applications from
> that era on current kernel.
Indeed. That's because the Linux kernel was a copy of another system
called (variously) Unix that had to that point about 20 years track
record in establishing a good pattern and establishing a demand industry
of people who actually wanted to use it to solve their problems.
No such with this key architecture. It was written in those times
according to a commercially inspired (i.e. property rights driven) model
that had zero track record in the wild.
And, the model turned out to be wrong. Yes you could build it, but it
solved the wrong problems in the wrong ways. By the time you strip away
the disproven assumptions, you're left with an empty shell full of
invested parties who keep saying, next year will be the year of the
thingummybob, whatever it is labelled today. TEE? Echo is a serious
issue in the secure token field.
> You can rewrite the software without starting from scratch.
The problem is, as soon as you get in there, you realise how broken it
is. OP's question was "how to store the PIN in the device" which is
reasonable from an app developers pov, but is totally /verboten/ from
the security model's pov. Change that and the dam breaks.
Sadly, at some stage, the dam will crack of its own accord and Mozilla
will have to figure out how to rebuild it.
iang