Posted late PB. Codefags, please take a look.
>Attention codefags!
>This anon's spouse is a computer geek but is not too into digging. Spouse said that good programmers looking to do mischief can hide the trojan horse OUTSIDE of the code.
>Looking at source code may not be enough. The attached paper describes a possible attack "trojan horse" can be found by disassembling object code, binaries, microcode. Can also be hardware based.
>Please read and spread to people digging the election software.
>If you don't want to click pdf, search:
>Ken Thompson, Turing Award winner.
>Paper "Reflections on Trusting Trust" 1984