> Or a bad guy can infect the origin machine of the signed app and alter
> the binary before its signed.
>
> Personally, I don't like letting ANYone run ANY code on my machine
> without my explicit permission. That includes HTML email.
Nobody said anything about running code without your permissi
Edward Ned Harvey wrote:
>2) Voluntary exploits. Something that tricks users into running
>something voluntarily, that they didn't know would be harmful.
> ...
>So why wouldn't a "bad guy" just sign their apps and bypass the prompts?
>Surely sometimes they will, but the process requires prov
So I never expected myself to do a 180 on this one, but .
Viruses, malware, etc come in one of two forms:
1) Involuntary exploits. Something that takes advantage of system
vulnerabilities. Every system everywhere is susceptible to this sort of
attack.
2) Voluntary exploits. Somet