Skip to main content

All Questions

Tagged with
-3votes
3answers
772views

Ken thompson's compiler hack [duplicate]

I have gone through ken thompson's compiler hack paper, can't we just go through the complier's source code and check for any backdoor, what was the article's point? https://www.archive.ece.cmu.edu/~...
user9355495's user avatar
180votes
11answers
57kviews

Is Ken Thompson's compiler hack still a threat?

Ken Thompson Hack (1984) Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
user avatar
3votes
1answer
189views

Is this possible to re-duplicate the hardware signal on Linux?

Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
Ted Wong's user avatar

close