[Openid-specs-fapi] Public Review Period for Proposed FAPI 2.0 Message Signing Implementer’s Draft
Anders Rundgren
anders.rundgren.net at gmail.com
Sat Mar 25 05:57:55 UTC 2023
I have no intention of ruining the party, but personally I stick to simpler solutions that also permit serialization and countersigning:
https://github.com/cyberphone/cbor-everywhere#signed-http-requests
With deterministic CBOR encoding, which nowadays is pushed by other people than me [*], we can safely put yesterday's problems with JSON to rest.
Anders
*] https://github.com/blockchaincommons
On 2023-03-24 23:57, Mike Jones via Openid-specs-fapi wrote:
> Announced at https://openid.net/2023/03/24/public-review-period-for-proposed-fapi-2-0-message-signing-implementers-draft/ <https://openid.net/2023/03/24/public-review-period-for-proposed-fapi-2-0-message-signing-implementers-draft/> and https://twitter.com/openid/status/1639400560196718592 <https://twitter.com/openid/status/1639400560196718592>.
>
> -- Mike
>
>
> _______________________________________________
> Openid-specs-fapi mailing list
> Openid-specs-fapi at lists.openid.net
> https://lists.openid.net/mailman/listinfo/openid-specs-fapi
More information about the Openid-specs-fapi
mailing list