First page Back Continue Last page Summary Graphic
44. A False Update
Create a false update for the cryptosystem and send it out to users.
When they load the update, it contains a Trojan horse that defeats the system.
- False updates have been used on a large scale before to break in
the IRC Trojan for example
- On a large scale, this is less likely to succeed
- Against a specific target, it tends to work well
Notes: