A Real World Scenario: Code Signing
A Real World Scenario: Code Signing
- current technology: shrink-wrap model
- on an unknown webpage:
- “FREE dancing pigs, click HERE to download”
- need ‘recommendations’ from trusted third parties
- level of virus and Trojan Horse inspection
- level of network access, local hard-disk access, processor usage, ...
- You make a decision based on the description of the third party.