It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
Ken ThompsonNo amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonIt is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.
Ken ThompsonNo amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken Thompson