Idle fun for net hackers..
On 29/02/12 20:44, Rod Speed wrote:
My last program isnt relevant. What matters is what is used to
compile the system that does the checks. With hashes the code
can be so simple that its quite practical to compile it by hand.
So you don't understand what I said then.
Wrong. There doesnt have to be any compiler involved at all.
You can compile by hand if you are that paranoid.
Rather more than that:
http://dl.acm.org/ft_gateway.cfm?id=358210&ftid=801607&dwn=1&CFID=68 419480&CFTOKEN=24779211
Reflections on trusting trust
Ken Thompson AT&T Bell Labs, Murray Hill, NJ
Communications of the ACM
Volume 27 Issue 8, Aug 1984
ACM New York, NY, USA
doi: 10.1145/358198.358210
--
djc
|