This paper came up on the b2g-internal list today and gives a good
overview:
http://www.lix.polytechnique.fr/hipercom/SmartObjectSecurity/papers/EricRescorla.pdf
- cross-posting here for reference.

On Wed, Dec 23, 2015 at 2:31 PM, Michiel de Jong <[email protected]>
wrote:

> Connecting from a web browser to a web site is just a special case of
> using "Device A", to connect to "Device B". Looking at the generic case
> where Device A and Device B can both be anyThing ;) brings up a few
> interesting questions:
>
> 1) How can a certificate authority vouch for the identity of Device B, if
> it does not have a URL? Unless we replace CA's with Web-of-Trust, this
> might be something to think about as more devices come into play that have
> no URL.
>
> 2) The user might have Device B in their eye sight. Does that help?
>
> If Device B can be many more things than just a web server in a data
> center, then you may be able to connect to it with more accuracy. For
> instance, by sticking a USB cable in it, touching it with your NFC reader,
> or pointing a camera at it.
>
> 3) How can you accurately connect to a device if you have no URL, and also
> no physical proximity?
>
> I'm not talking about how to protect Device B from unauthorized access
> (WPS buttons on WiFi routers etc.). What interests me is how you as a user
> can accurately identify the device you are connecting *to*.
>
> Curious if anyone has more thoughts on this! :)
>
>
> Cheers,
> Michiel.
>
_______________________________________________
dev-fxos mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-fxos

Reply via email to