He contracdicted himself
Apr 08, 2004
1:24 PM EST
|The Unix Trojan was in a closed source of the Unix compiler, it can be in a closed source OS any day and to make that type of Trojan, you have to start with a piece of software that you do not trust. If they want all the trust they need, start by asking the NSA to compile your compiler with there complier (I assume they trust the compiler they use. The source code for the backdoor used by Ken Thompson was not seen because it could not be seen.|
Apr 10, 2004
11:58 PM EST
|The NSA compiler had to be compiled using something. The problem is not about trusting NSA's compiler but about trusting this previous compiler (let's call it CC).
If CC is Thompsonized (pardon the neologism), then the NSA compiler is.
You can only dodge this by reading the NSA compiler's ASM code, or some other labour-intensive solution.
Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]
Becoming a member of LXer is easy and free. Join Us!