Anonymous ID: a874df Nov. 13, 2020, 8:24 a.m. No.11627046   🗄️.is 🔗kun   >>7126

Attention codefags!

This anon's spouse is a computer geek but is not too into digging. Spouse said that good programmers looking to do mischief can hide the trojan horse OUTSIDE of the code.

 

Looking at source code may not be enough. The attached paper describes a possible attack "trojan horse" can be found by disassembling object code, binaries, microcode. Can also be hardware based.

 

Please read and spread to people digging the election software.

 

If you don't want to click pdf, search:

Ken Thompson, Turing Award winner.

Paper "Reflections on Trusting Trust" 1984