§ 6.5.2.1: “The User verifies that the Wallet Instance (i.e., the application the User is installing) is genuine and authentic and does not contain any malware or other threats.” This requirement puts a lot of responsibilities on the shoulders of the user. This expectation is not realistic as all users may not have the skills to perform all the checks needed to verify the authenticity and security of a Wallet Instance.
§ 6.5.2.1: “The User verifies that the Wallet Instance (i.e., the application the User is installing) is genuine and authentic and does not contain any malware or other threats.” This requirement puts a lot of responsibilities on the shoulders of the user. This expectation is not realistic as all users may not have the skills to perform all the checks needed to verify the authenticity and security of a Wallet Instance.