|
What About Those Systems Without a Sandbox? |
| They are coming to get you | |
|
|
Impossible (almost) to retrofit security mechanisms (because there is no clean separation between the operating system and the applications) |
|
|
Impossible to enforce any non-trivial security policy (because you have to trust that the software you get does not contain a virus or malicious code) |
|
|
Digitally signing software alone does not go far (due to the lack of auditing facility and software liability) |