A remote attacker steals Alice's private key but does not have access to Alice's machine M. Can this attacker access the "budget" file which has the ACL in 4(a)?
The attacker can not access... View the full answer
Sign up to view the full answer
The attacker can't have access. To access the files the attacker need to steal the private key... View the full answer