Quote:
Originally Posted by ldolse
the hacker needs to gain access to something else in order for the exploit to succeed, in this example it's the user's trust, which is true of any Trojan.
|
You should always assume the trust is there, users are idiots. A developer should take that into account and not allow their project to be used to take advantage of a users system.