First page Back Continue Last page Summary Graphic
3. Buy a Key
Buy a public key under a fake name and start sending viruses with a signature that is traceable to the fictitious identity.
-
-
-
-
Since key revocation works so poorly today, this will likely be trusted for a long time to come.
Notes: