In fact, we started off with two or three different shells and the shell had life of its own.
Ken ThompsonNo amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonI wanted to separate data from programs, because data and instructions are very different.
Ken Thompson