IRC log of crypto on 2012-08-20
Timestamps are in UTC.
- 18:55:23 [RRSAgent]
- RRSAgent has joined #crypto
- 18:55:23 [RRSAgent]
- logging to http://www.w3.org/2012/08/20-crypto-irc
- 18:55:28 [asad]
- asad has joined #crypto
- 18:56:46 [Zakim]
- + +1.410.290.aabb
- 18:57:08 [rbarnes]
- rbarnes has joined #crypto
- 18:57:09 [virginie]
- zakim, this will be webcrypto
- 18:57:09 [Zakim]
- I do not see a conference matching that name scheduled within the next hour, virginie
- 18:57:37 [emily]
- emily has joined #crypto
- 18:58:07 [saerd]
- saerd has joined #crypto
- 18:58:43 [virginie]
- zakim, this will be webcrypt
- 18:58:43 [Zakim]
- I do not see a conference matching that name scheduled within the next hour, virginie
- 18:59:24 [virginie]
- zakim, this will be sec_webcrypt
- 18:59:24 [Zakim]
- I do not see a conference matching that name scheduled within the next hour, virginie
- 19:00:02 [ddahl]
- virginie: i see that it was started by Zakim
- 19:01:10 [rbarnes]
- i'm on the phone
- 19:01:21 [ddahl]
- virginie: ddahl is on the phone
- 19:01:59 [virginie]
- agenda ?
- 19:02:09 [emily]
- zakim, who is on the phone?
- 19:02:09 [Zakim]
- I notice SEC_WebCryp()3:00PM has restarted
- 19:02:10 [Zakim]
- On the phone I see +1.512.257.aaaa, +1.410.290.aabb, ddahl, emily, virginie, Google, saerd, [Microsoft]
- 19:02:14 [markw]
- markw has joined #crypto
- 19:02:18 [vgb]
- vgb has joined #crypto
- 19:02:22 [Zakim]
- +[Microsoft.a]
- 19:02:26 [Zakim]
- +JimD
- 19:02:31 [rbarnes]
- zakim: i am aabb
- 19:02:36 [rsleevi]
- rsleevi has joined #crypto
- 19:02:41 [rsleevi]
- Zakim, who is on the line?
- 19:02:41 [Zakim]
- I don't understand your question, rsleevi.
- 19:02:43 [vgb]
- Zakim, I am [Microsoft.a]
- 19:02:43 [Zakim]
- ok, vgb, I now associate you with [Microsoft.a]
- 19:02:44 [rbarnes]
- don't think that worked
- 19:02:46 [asad]
- +1.512.257.aaaa is asad
- 19:02:53 [Zakim]
- +Netflix
- 19:02:59 [selfissued]
- selfissued has joined #crypto
- 19:03:12 [markw]
- Zakim, Netflix has markw
- 19:03:12 [Zakim]
- +markw; got it
- 19:03:16 [rbarnes]
- zakim, i am +1.410.290.aabb
- 19:03:16 [Zakim]
- +rbarnes; got it
- 19:03:18 [selfissued]
- selfissued is Mike Jones
- 19:03:25 [vgb]
- Zakim, who's here?
- 19:03:25 [Zakim]
- On the phone I see +1.512.257.aaaa, rbarnes, ddahl, emily, virginie, Google, saerd, [Microsoft], [Microsoft.a], JimD, Netflix
- 19:03:27 [Zakim]
- Netflix has markw
- 19:03:27 [Zakim]
- On IRC I see selfissued, rsleevi, vgb, markw, saerd, emily, rbarnes, asad, RRSAgent, virginie, hhalpin, JimD, ddahl, timeless, tl, Zakim, trackbot, wseltzer_away
- 19:03:30 [wtc]
- wtc has joined #crypto
- 19:04:03 [arunranga]
- arunranga has joined #crypto
- 19:04:08 [hhalpin]
- Zakim, what's the code?
- 19:04:08 [Zakim]
- the conference code is 27978 (tel:+1.617.761.6200 sip:zakim@voip.w3.org), hhalpin
- 19:04:31 [Zakim]
- +??P18
- 19:04:37 [hhalpin]
- Zakim, ??P18 is hhalpin
- 19:04:37 [Zakim]
- +hhalpin; got it
- 19:04:55 [timeless]
- RRSAgent, draft minutes
- 19:04:55 [RRSAgent]
- I have made the request to generate http://www.w3.org/2012/08/20-crypto-minutes.html timeless
- 19:05:26 [timeless]
- s/zakim: i am aabb//
- 19:05:39 [Zakim]
- +arunranga
- 19:05:57 [ddahl]
- scribe: ddahl
- 19:06:09 [hhalpin]
- PROPOSAL: http://www.w3.org/2012/08/13-crypto-minutes.html is the correct minutes
- 19:06:12 [ddahl]
- hhalpin: is that the right command?
- 19:06:23 [JimD]
- I believe they are public
- 19:06:29 [hhalpin]
- they become public as soon as meeting is over
- 19:06:35 [hhalpin]
- see web-page for records of previous meetings
- 19:07:05 [hhalpin]
- ACCEPT: http://www.w3.org/2012/08/13-crypto-minutes.html is the correct minutes
- 19:07:22 [ddahl]
- virginie: Begin with presentation of the draft API
- 19:07:29 [hhalpin]
- not really, but it won't take into account any minor errors we tend to make and fix with s. If you really want to watch the minutes live, go for it.
- 19:07:58 [ddahl]
- rsleevi: A lot of the changes were in wordsmithing, still a lot of boilerplate to fill in
- 19:07:59 [virginie]
- http://www.w3.org/2012/webcrypto/WebCryptoAPI/
- 19:08:00 [hhalpin]
- topic: Presentation of new Web Crypto API update from editors
- 19:08:10 [hhalpin]
- scribenick: ddahl
- 19:08:53 [virginie]
- http://lists.w3.org/Archives/Public/public-webcrypto/2012Aug/0140.html
- 19:09:06 [zooko]
- zooko has joined #crypto
- 19:09:08 [ddahl]
- rsleevi: tried to describe how this api would work in a PKCS#1 mode
- 19:09:11 [timeless]
- RRSAgent, make logs public
- 19:09:14 [Zakim]
- +zooko
- 19:09:38 [timeless]
- RRSAgent, draft minutes
- 19:09:38 [RRSAgent]
- I have made the request to generate http://www.w3.org/2012/08/20-crypto-minutes.html timeless
- 19:09:46 [ddahl]
- ... wanted to point out the importance of the keyStorage interface
- 19:09:53 [asad]
- zakim, i am +1.512.257.aaaa
- 19:09:53 [Zakim]
- +asad; got it
- 19:10:18 [ddahl]
- rsleevi: types of keys and what origins authorize them
- 19:10:36 [timeless]
- s/+1.512.257.aaaa is asad//
- 19:10:53 [timeless]
- s/I believe they are public//
- 19:10:57 [timeless]
- s/they become public as soon as meeting is over//
- 19:10:59 [rbarnes]
- q+
- 19:11:01 [cjkula]
- cjkula has joined #crypto
- 19:11:03 [timeless]
- s/see web-page for records of previous meetings//
- 19:11:08 [ddahl]
- ... the key interface is mainly describing the metadata around the keys themselves not how it is initialized etc
- 19:11:13 [timeless]
- s/not really, but it won't take into account any minor errors we tend to make and fix with s. If you really want to watch the minutes live, go for it.//
- 19:11:30 [ddahl]
- ... spec'd diffie hellmen, but not ECC
- 19:11:46 [rbarnes]
- q-
- 19:11:55 [Zakim]
- +cjkula
- 19:12:18 [ddahl]
- ... if implementors have a preferred format for additional key types, feedback is very welcome based on the template provided in the spec
- 19:12:45 [ddahl]
- ... key import was also tackled here, thanks to vgb for his notes in the mailing list
- 19:13:39 [rsleevi]
- for (i = 0; i < window.crypto.keys.length; ++i) { window.crypto.keys[i]; }
- 19:13:41 [asad]
- q+
- 19:13:43 [markw]
- q+
- 19:13:47 [ddahl]
- rbarnes: key storage stuff looks good, is there a richer way to label the keys? metadata- > name, etc?
- 19:14:39 [ddahl]
- rsleevi: perhaps raise an issue on this - numeric getters and symbolic names are used in localStorage, perhaps we do the same?
- 19:14:57 [Zakim]
- + +1.303.661.aacc
- 19:15:13 [rsleevi]
- window.crypto.key['foo']
- 19:15:15 [vgb]
- q+
- 19:15:22 [sdurbha]
- sdurbha has joined #crypto
- 19:15:36 [ddahl]
- rbarnes: meta question: can I refer to a key in a persistent way? not clear if these indexes are persistent?
- 19:15:55 [ddahl]
- rsleevi: key object has a keyID and this is fully persistent
- 19:16:30 [vgb]
- q-
- 19:16:33 [ddahl]
- ... symbolic name vs numeric index? does this matter?
- 19:16:50 [rsleevi]
- http://www.w3.org/2012/webcrypto/WebCryptoAPI/#key-interface-members
- 19:17:11 [ddahl]
- virginie: did you specify the persistence of each key?
- 19:17:23 [ddahl]
- rsleevi: still need to do that - add language to clarify
- 19:17:36 [selfissued]
- q+
- 19:17:49 [rsleevi]
- ACTION: sleevi to add explicit language to clarify that Key object attributes are persistent to keys. the key.id is consistent between browsing contexts
- 19:17:49 [trackbot]
- Created ACTION-34 - Add explicit language to clarify that Key object attributes are persistent to keys. the key.id is consistent between browsing contexts [on Ryan Sleevi - due 2012-08-27].
- 19:17:54 [ddahl]
- asad: followup: can we indicate a source once we have the key ID?
- 19:18:21 [ddahl]
- ... certain operations would be tied to a specific provider
- 19:18:49 [ddahl]
- ... is the binding of the key ID to the corresponding source known to the web app?
- 19:19:16 [ddahl]
- rsleevi: if an implementation is going to expose providers, it is an implementation detail
- 19:19:38 [hhalpin]
- i.e. "custom attribute"
- 19:20:21 [ddahl]
- asad: if a user selects a key, it is up to the browser to make sure the operations are executed within the specific source?
- 19:20:59 [ddahl]
- rsleevi: yes, but there will be additional discussions on this - [reference to a recently closed issue]
- 19:21:04 [virginie]
- q?
- 19:21:16 [virginie]
- ack asad
- 19:21:22 [ddahl]
- ... this provider issue is in the secondary use cases
- 19:22:01 [ddahl]
- markw: where would we put the global Id for a pre-provisioned sym key?
- 19:22:59 [ddahl]
- rsleevi: there should be some kind of foreknowledge of the key's meta data that might be stored in localStorage, etc
- 19:23:08 [ddahl]
- ... need to raise an issue here
- 19:23:40 [ddahl]
- markw: do we need a couple of key IDs to help locate symmetric keys?
- 19:23:57 [ddahl]
- ... one global and one in the origin
- 19:24:52 [ddahl]
- rsleevi: pre-provisioned attrs should help here
- 19:25:45 [rsleevi]
- ddahl: The (closed) query issue was ACTION-16
- 19:26:24 [ddahl]
- markw: most of the attributes are user attributes seem to carry less weight than needed for unique IDs for symmetric keys
- 19:26:58 [ddahl]
- (ddahl note: that last bit was hard to scribe)
- 19:27:17 [ddahl]
- __markw: was that accurate?
- 19:27:56 [virginie]
- q?
- 19:28:05 [ddahl]
- rsleevi: there have been a few actions that did not have a wide consensus before closing them
- 19:28:12 [virginie]
- ack markw
- 19:28:30 [ddahl]
- markw: the GUID for sym keys issue needs more discussion
- 19:29:11 [hhalpin]
- either way of dealing with it is actually fine!
- 19:29:16 [hhalpin]
- perhaps its more of an open ISSUE
- 19:29:19 [hhalpin]
- than an action.
- 19:29:28 [hhalpin]
- q?
- 19:29:31 [hhalpin]
- q+
- 19:29:38 [ddahl]
- virginie: action 16 was closed, but probably needs postponement instead
- 19:30:02 [markw]
- just to be clear, a globally unique identifier for pre-provisioned symmetric keys needs more discussion (it's been suggested that the id field on the key - which is a local identifier - might actually be a GUID)
- 19:30:14 [ddahl]
- rsleevi: need to build better consensus on mailing list
- 19:30:55 [ddahl]
- selfissued: Need to touch on the relationship between JOSE and W3 web crypto - and how we will use JOSE
- 19:31:00 [rsleevi]
- http://www.w3.org/2012/webcrypto/WebCryptoAPI/#use-cases
- 19:31:25 [ddahl]
- selfissued: need to have new paragraph on this topic in the spec
- 19:31:37 [ddahl]
- virginie: there is something in the draft
- 19:31:43 [ddahl]
- ... to that effect
- 19:32:12 [ddahl]
- hhalpin: if someone has taken an action and cannot fullfil it - we need to open an issue to help keep track of it
- 19:32:25 [rsleevi]
- https://www.w3.org/2012/webcrypto/track/issues/17 / ISSUE-17 is tracking the discussion on attributes
- 19:32:31 [ddahl]
- ... or if consuensus cannot be reached
- 19:33:08 [markw]
- q+
- 19:33:17 [ddahl]
- hhalpin: JOSE was only being referenced in key import/export
- 19:33:21 [virginie]
- ack selfissued
- 19:33:35 [hhalpin]
- ack hhalpin
- 19:34:02 [ddahl]
- ... we are working on a lower-level API that may not support JOSE directly, however, later a high-level design may better support JOSE directly
- 19:34:28 [ddahl]
- selfissued: are you looking to get these new JOSE formats created?
- 19:34:53 [rsleevi]
- http://www.w3.org/2012/webcrypto/WebCryptoAPI/#dfn-KeyFormat
- 19:34:59 [ddahl]
- hhalpin: does the working group feel that it is something to discuss now
- 19:35:03 [ddahl]
- ...?
- 19:35:44 [ddahl]
- selfissued: we need to understand the use cases to make sure it makes sense to support JOSE, some use cases seem to exists just to support JOSE
- 19:35:58 [rsleevi]
- q+ to respond about JOSE
- 19:36:11 [ddahl]
- virginie: if we ask JOSE for new formats - private keys, etc, how long will it take to spec?
- 19:36:42 [ddahl]
- selfissued: we could have a draft in weeks, making it part of the spec may not happen until IETF ATL in 3 months
- 19:36:48 [arunranga]
- I don't think we need a "spec benediction" to start using it.
- 19:36:50 [hhalpin]
- I think the use-case is "key import/export" in the secondary features of the charter, http://www.w3.org/2011/11/webcryptography-charter.html.
- 19:37:14 [hhalpin]
- We have about a year to reach total stability on our spec, so timing should be relatively easy here
- 19:37:57 [rsleevi]
- virginie: There's an ISSUE ;)
- 19:38:00 [ddahl]
- markw: unique ID thing is functional and may need a separate issue
- 19:38:11 [virginie]
- q?
- 19:38:12 [ddahl]
- virginie: let it be so!
- 19:38:23 [virginie]
- ack markw
- 19:38:45 [ddahl]
- rsleevi: importing og JWK public keys seems like a very useful thing
- 19:39:20 [ddahl]
- ... exporting private keys may require some custom operations with polyfills etc in mind
- 19:39:38 [ddahl]
- ... exposing this kind of thing for RSA with OEAP will be tricky
- 19:39:58 [ddahl]
- ... is there a WEBIDL or JWK format that will allow this
- 19:40:01 [ddahl]
- ...?
- 19:40:42 [ddahl]
- ... we could create a WebIDL for this operation
- 19:41:16 [ddahl]
- selfissued: we should see if we can get IETF to also spec this format
- 19:41:38 [rsleevi]
- ack rsleevi
- 19:41:38 [Zakim]
- rsleevi, you wanted to respond about JOSE
- 19:41:45 [ddahl]
- rsleevi: the overhead of ASN.1 parser is part of this ongoing issue
- 19:41:53 [markw]
- q+
- 19:42:11 [ddahl]
- markw: want to understand how the DH will work?
- 19:42:22 [rsleevi]
- http://www.w3.org/2012/webcrypto/WebCryptoAPI/#dh
- 19:42:36 [ddahl]
- ... 2 operations, KeyGen and KD - do you use the KD to derive the key?
- 19:43:38 [ddahl]
- rsleevi: yes, 3 phases, 1. key gen, export key so we can get either side of key, then KD operation. Phase 2: derive shared secret
- 19:43:53 [ddahl]
- ... can an application polyfill? maybe, or we should specify this
- 19:43:55 [virginie]
- q+
- 19:44:07 [virginie]
- ack markw
- 19:44:15 [ddahl]
- markw: we might have a generic key exchange API that makes the algorithm an argument
- 19:44:29 [ddahl]
- rsleevi: strong case to keep this operations spearate
- 19:45:05 [ddahl]
- rsleevi: fairly common to separate these ops in most crypto APIs
- 19:45:20 [ddahl]
- markw: would like to have less specific key exchange API
- 19:45:29 [ddahl]
- ... less specific to alg
- 19:46:06 [ddahl]
- rsleevi: where do we draw the boundry between low and high level apis
- 19:46:30 [ddahl]
- ... looking for input for the preferred form here
- 19:46:59 [hhalpin]
- +1 re slipperly slope, we do have time limits!
- 19:46:59 [ddahl]
- virginie: markw: can you provide an example here?
- 19:47:06 [ddahl]
- markw: yes
- 19:48:04 [ddahl]
- virginie: we have some issues in the draft that do not appear in our issue tracker, should we add them?
- 19:48:23 [ddahl]
- rsleevi: yes, the intent was to get more input from WG members
- 19:48:36 [ddahl]
- rsleevi: we will convert them all over to real issues
- 19:49:37 [ddahl]
- virginie: there is still some heavy debate on the mailing list on various issues
- 19:50:01 [ddahl]
- vgb: the import export has made it into the draft, still need more feedback
- 19:50:15 [virginie]
- http://www.w3.org/2012/webcrypto/track/actions/open
- 19:50:21 [ddahl]
- virginie: we should cover the open actions
- 19:51:22 [hhalpin]
- ACTION-13 WTC and Arun to add missing use-cases [CONTINUES]
- 19:51:58 [hhalpin]
- ACTION-17 Review key generation and propose a way for user agents to expose unique IDs as first class [CONTINUES]
- 19:52:10 [hhalpin]
- q+
- 19:52:12 [ddahl]
- rsleevi: need to clarify action ?? to help with the understanding of issue 34
- 19:52:40 [ddahl]
- virginie: getRandomValues issue needs clarification
- 19:53:01 [hhalpin]
- ACTION-23: wseltzer return with report on XMLSec PAG [CONTINUES]
- 19:53:01 [trackbot]
- ACTION-23 Find out status of getrandom in HTML5 notes added
- 19:53:04 [ddahl]
- wtc: discussed this with ifette, just copied this from the whatwg site
- 19:54:13 [ddahl]
- hhalpin: unclear to me about each implementation
- 19:54:23 [ddahl]
- wtc: implemented in Chrome and Firefox
- 19:54:43 [ddahl]
- hhalpin: will the IE team be interested in implementing it
- 19:55:34 [ddahl]
- NOTE: the Firefox implementation is not landed in Firefox nightly yet, waiting on some DOM hackers to look at it. it is implemented in patches:)
- 19:56:01 [ddahl]
- vgb: IE team COULD easily implement this, however I do not speak for them:)
- 19:56:30 [ddahl]
- hhalpin: changes to the verbiage to make it more clear how this ended up in the spec
- 19:56:36 [ddahl]
- wtc: i can clarify this
- 19:56:53 [rsleevi]
- http://www.w3.org/2012/webcrypto/WebCryptoAPI/#Crypto-method-getRandomValues - current text
- 19:57:07 [ddahl]
- virginie: need commentary on the current draft from WG members
- 19:57:22 [hhalpin]
- ACTION: hhalpin to talk to adrian bateman re IE implementation of getRandomValues
- 19:57:22 [trackbot]
- Created ACTION-35 - Talk to adrian bateman re IE implementation of getRandomValues [on Harry Halpin - due 2012-08-27].
- 19:57:23 [rsleevi]
- +1 to proposals, and not just issues ;)
- 19:57:24 [ddahl]
- ... comments plus proposal are needed
- 19:57:29 [asad]
- +1
- 19:57:30 [ddahl]
- +1
- 19:57:31 [emily]
- +1
- 19:57:32 [virginie]
- +1
- 19:57:32 [hhalpin]
- +2
- 19:57:35 [arunranga]
- +1
- 19:57:35 [rbarnes]
- +1
- 19:57:38 [cjkula]
- +1
- 19:57:38 [vgb]
- +1
- 19:57:41 [wtc]
- +1
- 19:57:45 [sdurbha]
- +1
- 19:57:47 [JimD]
- +1 but we may need to comment on comments as well
- 19:58:15 [ddahl]
- virginie: need to go find the participants we may not have heard from to get feedback from them
- 19:58:18 [arunranga]
- Notes that the synchronous question is an important one which we didn't really discuss.
- 19:58:40 [hhalpin]
- thus the editors get a well-deserved vacation!
- 19:58:47 [ddahl]
- arunranga: i think the synch version should follow other existing DOM apis that do this
- 19:58:50 [hhalpin]
- as people get a week for comments
- 19:59:07 [ddahl]
- virginie: try to get as much feedback in by this Friday
- 19:59:31 [hhalpin]
- q+
- 19:59:32 [markw]
- q+
- 19:59:41 [virginie]
- ack virginie
- 20:00:14 [ddahl]
- rsleevi: some specs are barebones, some are fully spec'd with implementations, we have a number of open issues and actions yet, how far do we wnat to go before we feel like we have a publishable spec?
- 20:00:30 [ddahl]
- virginie: we can have many open issue before we publish FPWD
- 20:01:14 [hhalpin]
- ack hhalpin
- 20:02:05 [ddahl]
- hhalpin: some APIs just document what browsers already do, the nature of this API does want each issue to be well-documented
- 20:02:23 [ddahl]
- ... current draft is in good shape
- 20:02:55 [ddahl]
- markw: before FPWD we need each functional piece documented in the spec or in an open issue
- 20:03:20 [ddahl]
- markw: the identity piece is not well defined
- 20:03:21 [hhalpin]
- q+
- 20:03:34 [hhalpin]
- ack hhalpin
- 20:03:41 [ddahl]
- virginie: propose comments until next monday instead
- 20:04:26 [ddahl]
- rsleevi: comments may just be "here is an issue..."
- 20:04:29 [hhalpin]
- please send *exact* text if possible to the editors on the mailing list!
- 20:05:26 [ddahl]
- rsleevi: please propose text and raise issues, but at least raise issues
- 20:05:48 [zooko]
- bye!
- 20:05:51 [Zakim]
- -rbarnes
- 20:05:52 [Zakim]
- -emily
- 20:05:52 [Zakim]
- -Google
- 20:05:53 [Zakim]
- -Netflix
- 20:05:53 [Zakim]
- -JimD
- 20:05:54 [Zakim]
- - +1.303.661.aacc
- 20:05:54 [Zakim]
- -hhalpin
- 20:05:56 [Zakim]
- -arunranga
- 20:05:57 [ddahl]
- virginie: meeting over amd thanks ryan!
- 20:05:58 [Zakim]
- -cjkula
- 20:06:00 [Zakim]
- -zooko
- 20:06:02 [Zakim]
- -asad
- 20:06:04 [Zakim]
- -virginie
- 20:06:07 [Zakim]
- -[Microsoft.a]
- 20:06:08 [Zakim]
- -ddahl
- 20:06:10 [Zakim]
- -saerd
- 20:07:40 [virginie]
- zakim, bye
- 20:07:40 [Zakim]
- leaving. As of this point the attendees were +1.512.257.aaaa, +1.410.290.aabb, saerd, ddahl, emily, virginie, Google, [Microsoft], JimD, markw, rbarnes, hhalpin, arunranga, zooko,
- 20:07:40 [Zakim]
- Zakim has left #crypto
- 20:07:43 [Zakim]
- ... asad, cjkula, +1.303.661.aacc
- 20:08:29 [virginie]
- rrsagent, draft minutes
- 20:08:29 [RRSAgent]
- I have made the request to generate http://www.w3.org/2012/08/20-crypto-minutes.html virginie
- 20:08:55 [virginie]
- rrsagent, make log public
- 20:09:13 [zooko]
- Hm, who is 303.661?
- 20:09:18 [zooko]
- Because that's also my area code. ☺
- 20:09:49 [virginie]
- rrsagent, byerrsagent, bye
- 20:09:49 [RRSAgent]
- I see 2 open action items saved in http://www.w3.org/2012/08/20-crypto-actions.rdf :
- 20:09:49 [RRSAgent]
- ACTION: sleevi to add explicit language to clarify that Key object attributes are persistent to keys. the key.id is consistent between browsing contexts [1]
- 20:09:49 [RRSAgent]
- recorded in http://www.w3.org/2012/08/20-crypto-irc#T19-17-49
- 20:09:49 [RRSAgent]
- ACTION: hhalpin to talk to adrian bateman re IE implementation of getRandomValues [2]
- 20:09:49 [RRSAgent]
- recorded in http://www.w3.org/2012/08/20-crypto-irc#T19-57-22