Practical examples of a trusting trust attack
Ken Thompson’s famous trusting trust paper describes an attack wherein a compiler is subverted, and subsequently subverts all software it compiles, including itself. I have always thought the idea of the trusting trust attack is somewhat f… Continue reading Practical examples of a trusting trust attack