Software cannot access certain resources, such as cryptographic keys and credentials, regardless of the access rights of ...