Hacker News
- Reflections on Trusting Trust (1984) [pdf] https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf 19 comments
- Ken Thompson: Reflections on Trusting Trust (Turing Award Lecture on planting a backdoor, 1984) https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf 5 comments linux
- Ken Thompson: Reflections on Trusting Trust (Turing Award Lecture, 1984) https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf 17 comments programming
- “Reflections on Trusting Trust: To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software” http://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf 2 comments programming
Linking pages
- Application Trust is Hard, but Apple does it Well — Security Embedded https://www.security-embedded.com/blog/2020/11/14/application-trust-is-hard-but-apple-does-it-well 225 comments
- Have we reached a point of no return on managing software dependencies? · Paolo Mainardi https://www.paolomainardi.com/posts/point-of-no-return-on-managing-software-dependencies/ 64 comments
- Adding build provenance to Homebrew | Trail of Bits Blog https://blog.trailofbits.com/2023/11/06/adding-build-provenance-to-homebrew/ 46 comments
- GitHub - facundoolano/software-papers: 📚 A curated list of papers for Software Engineers https://github.com/facundoolano/software-papers/ 33 comments
- Thoughts on the xz backdoor: an lzma-rs perspective | Blog | Guillaume Endignoux https://gendignoux.com/blog/2024/04/08/xz-backdoor.html 22 comments
- Pluralistic: 05 Dec 2020 – Pluralistic: Daily links from Cory Doctorow https://pluralistic.net/2020/12/05/trusting-trust/ 18 comments
- Reading List for the mindful Software Engineer | Daniel's programming rants https://gerlacdt.github.io/posts/classic-papers/ 3 comments
- GitHub - chainguard-dev/ssc-reading-list: A reading list for software supply-chain security. https://github.com/chainguard-dev/ssc-reading-list 3 comments
- GitHub - kklash/mnemonikey: Determinstic backup and recovery of PGP keys using human-readable phrases. https://github.com/kklash/mnemonikey 3 comments
- GitHub - fallible-algebra/n-functor: Deriving `map` for types with many parameters, with options for types that aren't yours. https://github.com/fallible-algebra/n-functor 2 comments
- Can We Build Trustable Hardware? Andrew Huang at 36C3 https://www.infoq.com/news/2020/01/can-we-build-trustable-hardware/ 0 comments
- Huawei 5G, The UK Gets A Lesson In Go · Privacy, Power, & Protection In The Cyber Century https://blog.eutopian.io/huawei-5g-the-uk-gets-a-lesson-in-go/ 0 comments
- Privacy and freedoms consideration of Covid-19 health passports or certificates https://blog.lukaszolejnik.com/privacy-and-rights-of-covid19-health-passport-certificates/ 0 comments
- GitHub - tmpout/awesome-elf https://github.com/tmpout/awesome-elf 0 comments
- Why the Software Supply Chain Needs More Security | Future https://future.com/securing-the-software-supply-chain/ 0 comments
- Pluralistic: 28 Jul 2022 – Pluralistic: Daily links from Cory Doctorow https://pluralistic.net/2022/07/28/descartes-was-an-optimist/#uh-oh 0 comments
- Hacker lexicon: What is a supply chain attack? | Ars Technica https://arstechnica.com/information-technology/2021/06/hacker-lexicon-what-is-a-supply-chain-attack/ 0 comments
- What Is a Supply Chain Attack? | WIRED https://www.wired.com/story/hacker-lexicon-what-is-a-supply-chain-attack/ 0 comments
- Getting Serious About Open Source Security | by Dan Lorenc | Medium https://medium.com/@dlorenc/getting-serious-about-open-source-security-1d15609478fa 0 comments
- Confidential AI From GPU Enclaves https://blog.blyss.dev/confidential-ai-from-gpu-enclaves/ 0 comments
Would you like to stay up to date with Unix? Checkout Unix
Weekly.
Related searches:
Search whole site: site:www.cs.cmu.edu
Search title: Reflections on Trusting Trust (1984) [pdf]
See how to search.