First page Back Continue Last page Summary Graphic
28. Fake a Distribution
Create a false distribution of a PKI system and put it into the infrastructure as a replacement for the original.
Then people will download the Trojan version and think they have the real thing.
The 'self-authentication' will of course claim it is legitimate.
Particularly effective against small organizations
Notes: