Follow

Ken Thompson's "Trusting Trust" compiler Trojan attack is not just a thought experiment. In fact, it was actually what he really did in real life. In a 1995 mail, he said he was able to successfully compromise the Unix Support Group at Bell Labs.

I first learned this Unix computer folklore at an free software meetup, and later shared it online. I was immediately corrected by someone, saying it's just a myth. I went to read the original paper and it seemed to be the case. there's actually more into this. The folklore is basically true.

@niconiconi I'd love to read the paper, do you have a link to share it?
Sign in to participate in the conversation
Cybrespace

cybrespace: the social hub of the information superhighway jack in to the mastodon fediverse today and surf the dataflow through our cybrepunk, slightly glitchy web portal support us on patreon or liberapay!