What About Those Systems Without a Sandbox? |
They are coming to get you | |
![]() |
Impossible (almost) to retrofit security mechanisms (because there is no clean separation between the operating system and the applications) |
![]() |
Impossible to enforce any non-trivial security policy (because you have to trust that the software you get does not contain a virus or malicious code) |
![]() |
Digitally signing software alone does not go far (due to the lack of auditing facility and software liability) |