A mighty fortress is our PKI, Part II

James A. Donald jamesd at echeque.com
Fri Aug 6 14:57:44 EDT 2010


On 2010-08-05 11:30 AM, David-Sarah Hopwood wrote:
 > Signatures are largely a distraction from the real problem: that software
 > is (unnecessarily) run with the full privileges of the invoking user.
 > By all means authenticate software, but that's not going to prevent 
malware.

A lot of devices are locked down so that you cannot install bad 
software.  This is somewhat successful in preventing bad software from 
being installed, and highly successful in irritating users.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list