can be a ability that gives an operator the chance to trojan an OS X disk picture (.dmg) installer with one or more wished-for operator specified executables for a one particular-time execution.solves a crucial dilemma for the malware operators on the CIA. Even one of the most complex malware implant on the goal Personal computer is useless if ther