Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
dllthomas
on Feb 8, 2015
|
parent
|
context
|
favorite
| on:
The Ken Thompson Hack
It does not rely on you trusting any of the compilers to be uncompromised. It relies on you trusting at least one pair of the compilers to not be
identically
compromised.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: