Linked by Thom Holwerda on Sun 6th Jan 2013 23:00 UTC
Windows "It's taken longer than expected but it has finally happened: unsigned desktop applications run on Windows RT. Ironically, a vulnerability in the Windows kernel that has existed for some time and got ported to ARM just like the rest of Windows made this possible. MSFT's artificial incompatibility does not work because Windows RT is not in any way reduced in functionality. It's a clean port, and a good one. But deep in the kernel, in a hashed and signed data section protected by UEFI's Secure Boot, lies a byte that represents the minimum signing level." Good stuff. Very good stuff.
Permalink for comment 547671
To read all comments associated with this story, please click here.
RE[5]: Seems like a lot of work
by Nelson on Mon 7th Jan 2013 15:26 UTC in reply to "RE[4]: Seems like a lot of work"
Member since:

It's probably a bad business plan to base your app on a vulnerability in the base OS, but hey, that's just my way of thinking.

That's just reality. The Windows Runtime is the future of Windows, and Windows RT is the direction that Microsoft is headed in. I don't believe the transition will be complete until WinRT completely replaces Win32, but it will eventually happen.

This blog post is insightful and sheds a lot of light on their strategy:

Reply Parent Score: 2