Hacker News
- Ken Thompson: Reflections on Trusting Trust (1984) http://cm.bell-labs.com/who/ken/trust.html 9 comments
- Reflections on Trusting Trust (1984) http://cm.bell-labs.com/who/ken/trust.html 3 comments
- Reflections on Trusting Trust (Ken Thompson's Turing Award speech) http://cm.bell-labs.com/who/ken/trust.html 34 comments
- Ken Thompson: "You can't trust code that you did not totally create yourself", interesting article on Trojan's in compilers. http://cm.bell-labs.com/who/ken/trust.html 28 comments opensource
- Reflections on Trusting Trust - Ken Thompson http://cm.bell-labs.com/who/ken/trust.html 4 comments netsec
- Ken Thompson: Reflections on Trusting Trust (classic paper) http://cm.bell-labs.com/who/ken/trust.html 8 comments programming
Linking pages
- smq/hackernews-links-in-comments.md at master · antontarasenko/smq · GitHub https://github.com/antontarasenko/smq/blob/master/reports/hackernews-links-in-comments.md 136 comments
- “FBI Added Secret Backdoors to OpenBSD IPSEC” – OSnews http://www.osnews.com/story/24136/_quot_FBI_Added_Secret_Backdoors_to_OpenBSD_IPSEC_quot_ 64 comments
- Your Computer May Already be Hacked -- NSA Inside? http://www.forbes.com/sites/steveblank/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/ 29 comments
- Porting &ampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampLTspan class="caps">GHC&ampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampLT/span>: A Tale of Two Architectures | Colin Watson's blog http://www.chiark.greenend.org.uk/ucgi/~cjwatson/blosxom/2014-04-15-porting-ghc-a-tale-of-two-architectures.html 25 comments
- Life, Death, and Splitting Secrets http://www.moserware.com/2011/11/life-death-and-splitting-secrets.html 9 comments
- Your Computer May Already be Hacked -- NSA Inside? http://www.forbes.com/sites/steveblank/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/2/ 8 comments
- The new Reflections on Trusting Trust : ezyang’s blog http://blog.ezyang.com/2011/10/the-new-reflections-on-trusting-trust/ 8 comments
- Planet 5 http://planet5.cat-v.org/ 6 comments
- Reply to Zooko | Silent Circle Blog http://silentcircle.wordpress.com/2013/08/17/reply-to-zooko/ 0 comments
- Xcode Compromised • furbo.org http://furbo.org/2015/03/10/xcode-compromised/ 0 comments
- Essays: How to Design—And Defend Against—The Perfect Security Backdoor - Schneier on Security https://www.schneier.com/essays/archives/2013/10/how_to_design_and_de.html 0 comments
- How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer | Ars Technica http://arstechnica.com/security/2014/01/how-the-nsa-may-have-put-a-backdoor-in-rsas-cryptography-a-technical-primer/ 0 comments
- Big Data in the Small: Why N Tier Architectures Are an Antipattern - Food Fight http://foodfightshow.org/2012/09/big-data-in-the-small-why-n-tier-architectures-are-an-antipattern.html 0 comments
- GitHub - kyledrake/theftcoinjs: Pre-browserified, pre-minified, and pre-uglified version of BitcoinJS that will probably steal your money. https://github.com/kyledrake/theftcoinjs 0 comments
Related searches:
Search whole site: site:cm.bell-labs.com
Search title: ACM Classic: Reflections on Trusting Trust
See how to search.