Compromising the customer computer, for example by putting in a destructive root certificate in to the program or browser have faith in retail outlet. Ordinarily, the certification is made up of the title and e-mail address of the licensed person and is particularly mechanically checked because of the server on http://XXX