Such attacks on e-mail integrity sound outlandish, and they are, in fact, difficult to carry out and quite rare. Because it is handled end-to-end, with no server support required, it is virtually impossible for some kind of virus to modify a digitally signed message in transit and add links to malicious websites, or for the message to have come from someone other than who it appears to have come from, with a properly-deployed and secured digital signature infrastructure.ĭigital signatures can also prevent corporate intrigue, such as a devious businessman intercepting a competitor's messages to alter the terms of contracts, change data in reports, or otherwise surreptitiously corrupt the message or attachments. When you receive a digitally signed e-mail, you can click on web links in the message and open the attachments, and trust they will be safe-so long as you trust the person who sent you the message, and trust the sender's implementation of digital signatures.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |