Charles said:
AndyC said:
*snip*

UAC is not a security boundary. I'm sorry I used the term "feature". UAC is not a security boundary.

C

Agreed. UAC is not a security boundary. It is a security feature. The whole Trustworthy Computing/SDL thing is supposed to mean you ship security features in the most secure setting - Secure by Design, Secure by Default, Secure by Deployment+Communication. That appears to have been forgotten.