@@ -53,10 +53,102 @@ List of participants included in the meeting report annex.
-
### 2.3 Cryptography
- Let's discuss if we need to discuss.
All browser should do their best to support post quantum cryptography,
In our call today it was clear that all participating members are working toward having the capability of quantum secure algorithms / approaches in their products.
We would like to have some expertise here to help us understand the nuances
---
# Meeting Notes: Browser Security Standards Working Group
**Date:** September 26, 2025
**Duration:** ~1 hour 11 minutes (main session)
## Overview
Discussion focused on developing browser security standards for the Cyber Resilience Act (CRA), specifically reviewing Section 4.6 containing capability-based threat modeling and requirement classification.
## Key Topics Discussed
### 1. Document Structure and Approach
-**Section 4.6** identified as the normative (mandatory) part containing testable requirements
- Everything outside 4.6 is informative only
- Focus on capability-based approach where browsers may or may not have certain capabilities
- Requirements will be applied to specific use cases (e.g., embedded browsers vs personal browsers)
### 2. Domain and Origin Isolation
- Identified as one of the most complex and expensive security features to implement
-**Sylvestre's concerns:**
- Implementation can require significant investment (Mozilla spent ~$10-20M on E10S/Fission)
- Technical nuances difficult to capture in simple requirements
- Safari still catching up; Chrome has best architecture currently
- Recommendation to move this to end of document as it may deter initial engagement
### 3. Cryptography Standards
-**Challenge:** Standards must remain valid for 36 months from publication (~September 2025)
- Quantum computing threat timeline uncertain (could be imminent or 5-20 years away)
-**Consensus reached:**
- Avoid specifying specific algorithms or versions
- Reference state-of-the-art as described in EUCC guidelines from ENISA
- Support post-quantum cryptography capabilities
- Focus on concepts rather than specific implementations
### 4. Testing and Conformity Assessment
- Browsers classified as "Important Class 1" products
-**Three conformity options:**
1. Self-assessment using harmonized standards
2. Common specifications
3. EUCC certification
- If none used, third-party assessment required
-**Special note:** EIDAS 2 compliance requires mandatory inspection by conformity assessment body
### 5. Market Surveillance Considerations
- Testing must be binary (yes/no) and testable
- Market surveillance authorities need ability to verify compliance
- Challenges with software complexity vs hardware inspection