How does FOAF+SSL work with public terminals ?
There are a few ways FOAF+SSL could be made to work with public terminals: Using short term certificates: • The user needs to be able to login to the server securely. There are a number of ways of doing that: • have the server send a one time password via SMS • use a Yubikey to create one time very secure passwords using a one button USB stick that acts as a keyboard • there are many other ways to create one time password – such as writing out a series on a piece of paper • Foaf+ssl certificate services could allow one to create temporary certificates with very limited time duration (minutes or hours) (as demonstrated by the webid.myxwiki.org service – though a much better UI experience is of course imaginable) Once the certificate time limit expired, they become unuseable – by the definition of the TLS protocol. • furthermore foaf+ssl services could make it easy for users to disable certificates either via a web interface, or for example by sending a reply to the one-time password key