[Openid-specs-fapi] Public Review Period for Proposed FAPI 2.0 Message Signing Implementer’s Draft

Anders Rundgren anders.rundgren.net at gmail.com
Sat Mar 25 05:57:55 UTC 2023


I have no intention of ruining the party, but personally I stick to simpler solutions that also permit serialization and countersigning:
https://github.com/cyberphone/cbor-everywhere#signed-http-requests

With deterministic CBOR encoding, which nowadays is pushed by other people than me [*], we can safely put yesterday's problems with JSON to rest.

Anders

*] https://github.com/blockchaincommons

On 2023-03-24 23:57, Mike Jones via Openid-specs-fapi wrote:
> Announced at https://openid.net/2023/03/24/public-review-period-for-proposed-fapi-2-0-message-signing-implementers-draft/ <https://openid.net/2023/03/24/public-review-period-for-proposed-fapi-2-0-message-signing-implementers-draft/> and https://twitter.com/openid/status/1639400560196718592 <https://twitter.com/openid/status/1639400560196718592>.
> 
>                                                         -- Mike
> 
> 
> _______________________________________________
> Openid-specs-fapi mailing list
> Openid-specs-fapi at lists.openid.net
> https://lists.openid.net/mailman/listinfo/openid-specs-fapi



More information about the Openid-specs-fapi mailing list