But then of course, to relieve users from the burden of making security decisions one needs the whole chain of authentication of executables, access control and a trust system to dispense privileges.
Except you don't confirm anything. A fake UAC doesn't have any magic powers, nor can it pass your click on to the real UAC.
The problem UAC solves is that you click on a harmless dialog, but suddenly an important dialog is swapped in under your mouse. A fake UAC can't do that.
http://www.micro-isv.asia/img/win7uac.png