First page Back Continue Last page Summary Graphic
44. A False Update
- Create a false update for the cryptosystem and send it out to users.
- When they load the update, it contains a Trojan horse that defeats the system.- False updates have been used on a large scale before to break in
 the IRC Trojan for example
- On a large scale, this is less likely to succeed
- Against a specific target, it tends to work well
 
Notes: