First page Back Continue Last page Summary Graphic
3. Buy a Key
- Buy a public key under a fake name and start sending viruses with a signature that is traceable to the fictitious identity.
- 
- 
- 
- 
- Since key revocation works so poorly today, this will likely be trusted for a long time to come. 
Notes: