No amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonI wanted to separate data from programs, because data and instructions are very different.
Ken ThompsonOn the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids.
Ken ThompsonIt is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
Ken Thompson