Crypto - Necessary But Not Sufficient
Many (most?) vulnerabilities in practice due to:
- software bugs
- configuration errors
- especially insecure installation defaults
- Trojan horses
- e.g., Microsoft Word macros, innumerable Windows viruses
Old bugs are exploited much more than new ones
- many machines run old software versions