Alice's digital signature does not prove that Alice … ignore a messy detail that lies between Alice … her key to sign documents without her knowledge … a fingerprint scanner), the malicious code could wait … key is not in tamper-resistant hardware, the malicious …
Google-1
Google-2
Copyright clearance needed for quotation.