The user does not know how to load every program into a disassembler and
monitor every socket and comms channel. The user is therefore NOT
qualified to click UAC.
Do you know how to do those things? And if you do, do you do those things
before/while running every application? I certainly wouldn't know enough
about these things to get anything meaningful out of the analysis. I go by
my gut feeling when deciding on whether to run a program with admin rights.
And that's something all users can do, regardless of their technical
experience.
UAC is putting control in the user's hands for them to make these high-level
decisions about what programs to give complete control over their computer,
on an as-it-happens basis. It is not about low-level things like com ports
and sockets.
If the user has heard about those nasty rootkits and doesn't want to allow
sony software full control of their computer, UAC is the means that allows
them to stop this from happening. If the user could care less, then so be
it. Point is, they have the control.
The user is the only one qualified to click UAC, because that is who UAC is
for - the user of the computer. To allow them control over the programs they
run. If they don't know how or don't want to use it, then they don't have
to. If they do know how or want to learn how, they now have the power.
Trust isn't about analyzing the program to see what bits it is moving
around; a computer can do that. Trust is about the user deciding whether
they want a program they are running to have complete, unrestricted access
to their computer based on what they are doing at the time and what they
know about the author of the program. This is something the computer can't
do.
No they were not! Perhaps on badly configured systems where users were
running with Admin rights (as default dictated by Microsoft).
Well, the majority of people were running "badly configured systems" per
your definition here. Microsoft is fixing their previous mistake thru UAC
All they needed to do was have an installer account (that does not have
internet access) and a user account where people can check their email and
look at their holiday snaps.
Sure ... assuming Microsoft wants to break compatibility with every software
program known to man.
The way I see it, UAC is a watered-down half-measure that was only
introduced because Microsoft didn't have the guts to set user accounts as
defaults. Hell, they even watered down the security on the user accounts
by making them able to redirect HKLM!
UAC waters down nothing - UAC implements a pure security model while still
allowing older applications to work. Running as an administrator in UAC is
*exactly* the same as running as a standard user in XP/Vista and using a
seperate admin account to install programs. There was no compromise in
security - the only difference is the UAC model provides application
compatibility and a slightly better user experience.
I don't see an obvious security vulnerability created by a per-user
recreation of HKLM that only non-vista-compatible programs can see. The
changes/settings stored there don't affect anything global - they only
affect the application that writes those settings there.