¨Claim: None
¨Assumptions
(confidences):
–All code is trusted
code (0%)
–Attacker has sub-20
I.Q. (0%)
¨Actions to
Compromise:
–Run the installer
• [ This
is done by the user, which saves the potential hacker a great deal of time. ]
–Turn the machine
on.
¨Well, at least the
claim is right…