A mighty fortress is our PKI, Part II
James A. Donald
jamesd at echeque.com
Fri Aug 6 14:57:44 EDT 2010
On 2010-08-05 11:30 AM, David-Sarah Hopwood wrote:
> Signatures are largely a distraction from the real problem: that software
> is (unnecessarily) run with the full privileges of the invoking user.
> By all means authenticate software, but that's not going to prevent
malware.
A lot of devices are locked down so that you cannot install bad
software. This is somewhat successful in preventing bad software from
being installed, and highly successful in irritating users.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list