First page Back Continue Last page Summary Graphic
28. Fake a Distribution
- Create a false distribution of a PKI system and put it into the infrastructure as a replacement for the original.
- Then people will download the Trojan version and think they have the real thing.
- The 'self-authentication' will of course claim it is legitimate.
- Particularly effective against small organizations
Notes: