Ocupation: Computer Designer
Life: b. February 4, 1943
Birthday: February 4
No amount of source-level verification or scrutiny will protect you from using untrusted code.
source: "Reflections on Trusting Trust". Communications of the ACM 27 (8), (pp. 761-763), August 1984.
topic: Levels, Scrutiny, Source, Verification