Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How much source code was committed in that span? Time to audit it all. Plus the binaries and other resources that are pulled off network shares at build time. Plus the compilers...


You already hinted at it, but anyone interested in computer security should read Ken Thompson's short but majestic "Reflections on trusting trust".




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: