No amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonI wanted to separate data from programs, because data and instructions are very different.
Ken ThompsonNo amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonI wanted to separate data from programs, because data and instructions are very different.
Ken Thompson