the registry, or install a software. Presumably, this makes it harder for malware to operate. Why can't Windows tell the difference between me clicking the mouse to do a thing, and something happening through software without the user doing anything to initiate it?
Anonymous B joined in and replied with this 1 year ago, 2 minutes later[^][v]#1,296,122
How would it tell the difference?
Software can control the position of the cursor, and some malware is introduced through peripheral devices. If you plug in a USB drive, and that drive tells the computer it's the users mouse, then Windows has no way to tell which is a legitimate control from the user.
boof (OP) replied with this 1 year ago, 2 minutes later, 6 minutes after the original post[^][v]#1,296,125
@1,296,122 (B)
maybe they should make windows be able to tell that I'm using the fucking mouse somehow. maybe in hardware? these people should have some geniuses among them
also, if malware is that sophisticated, then why doesn't it already programmatically click the confirmation popups itself?
Anonymous B replied with this 1 year ago, 2 minutes later, 14 minutes after the original post[^][v]#1,296,130
@1,296,125 (boof) > if malware is that sophisticated, then why doesn't it already programmatically click the confirmation popups itself?
You answered your own question. There are teams of security researchers at Microsoft who have figured out that this is the most effective way to stop malware.
Anonymous F joined in and replied with this 1 year ago, 38 minutes later, 1 hour after the original post[^][v]#1,296,151
There's a setting now in Windows for making the UAC popups not take full focus and black out the rest of the screen. Which is probably more secure and should be the default since you aren't forced to click an option to keep using your computer
> > if malware is that sophisticated, then why doesn't it already programmatically click the confirmation popups itself? > > You answered your own question. There are teams of security researchers at Microsoft who have figured out that this is the most effective way to stop malware.
you are not making sense. if the malware indeed knows how to mimic confirmation popup mouse clicking, then why the fuck is it supposedly having any value to stop malware?
tteh !MemesToDNA joined in and replied with this 1 year ago, 2 hours later, 11 hours after the original post[^][v]#1,296,220
Since nobody has actually answered your question: the UAC prompt opens in "secure desktop mode", where the process runs in protected memory and interaction by any running process is restricted. Only Windows services can access secure desktop mode.
As for malware moving the mouse, it would need to have attained administrator privileges already to function during the UAC prompt, to my understanding. In which case you'd already be fucked.
tteh !MemesToDNA replied with this 1 year ago, 2 minutes later, 11 hours after the original post[^][v]#1,296,228
@previous (F)
Bonzai Buddy can click UAC prompts, because Microsoft explicitly whitelisted him due to him being a friendly little fellow who'd never get up to no good.
> As for malware moving the mouse, it would need to have attained administrator privileges already to function during the UAC prompt, to my understanding. In which case you'd already be fucked.
A lot of common apps are required to be run as administrator, usually under the pretext of updating said software.