| ▲ | digitalPhonix 4 hours ago | |||||||
It’s more complicated because it has to include logic about which network to connect to and how to tunnel back to the original provider (or partner) while roaming. So it’s more like: which network to connect to, keys, fallback network selection logic and tunnel logic to get authorisation on a non-home network | ||||||||
| ▲ | kevincox 4 hours ago | parent [-] | |||||||
That's a good point. That is what I meant by "and config" in my first sentence. IIUC if the keypair was a certificate with a few other fields foreign networks could give you some basic communication with your provider and decided if you should be allowed to use this network and if/how to tunnel you back to the home network. But the main point is that it should just be data that the user can port around to different devices as they see fit and that they can trust not to do malicious things. | ||||||||
| ||||||||