No amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonIn fact, we started off with two or three different shells and the shell had life of its own.
Ken ThompsonNo amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonIn fact, we started off with two or three different shells and the shell had life of its own.
Ken Thompson