Edward Ned Harvey wrote:

>2)      Voluntary exploits.  Something that tricks users into running
>something voluntarily, that they didn't know would be harmful.
> ...
>So why wouldn't a "bad guy" just sign their apps and bypass the prompts?
>Surely sometimes they will, but the process requires providing verifiable
>personal information.  So I don't think any significant number of people
>will release illegal or really bad stuff that way.  I think the worst signed
>apps will be fully legal, and easily uninstallable, although they may be
>annoying, like popup ads and junk like that.  

Or a bad guy can infect the origin machine of the signed app and alter
the binary before its signed.

Personally, I don't like letting ANYone run ANY code on my machine
without my explicit permission. That includes HTML email.
-- 
         Dave Close, Compata, Irvine CA       +1 714 434 7359
       d...@compata.com              dhcl...@alumni.caltech.edu
       "Political campaigns are the graveyard of real ideas and
       the birthplace of empty promises." -- Teresa Heinz Kerry

_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to