Authors:
  • No amount of source-level verification or scrutiny will protect you from using untrusted code.

    "Reflections on Trusting Trust". Communications of the ACM 27 (8), (pp. 761-763), August 1984.
Cite this Page: Citation