![]() ![]() In 2010, security expert Florian Zumbiehl demonstrated a similar attack, but it didn't receive much attention. ![]() Other attacks relied on using faulty signatures that could be created without knowledge of the cryptographic private key that the validation code would still consider valid.Ĭoncerns about the security of PDF signatures are not new. Some of the attacks relied on taking a PDF document that was already signed digitally and modifying it in a way that the signature was still considered valid for the whole document, although the content of the document was completely modified. While they usually were able to spot simple modifications for partially faulty documents, these viewers could be tricked. PDF viewers do a poor job accounting for this.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |