Anonymous ID: 2b0222 Nov. 13, 2020, 8:37 a.m. No.11627223   🗄️.is 🔗kun   >>7328 >>7422 >>7441

Posted late PB. Codefags, please take a look.

>>11627046

>Attention codefags!

 

>This anon's spouse is a computer geek but is not too into digging. Spouse said that good programmers looking to do mischief can hide the trojan horse OUTSIDE of the code.

 

>Looking at source code may not be enough. The attached paper describes a possible attack "trojan horse" can be found by disassembling object code, binaries, microcode. Can also be hardware based.

 

>Please read and spread to people digging the election software.

>If you don't want to click pdf, search:

>Ken Thompson, Turing Award winner.

>Paper "Reflections on Trusting Trust" 1984