[[[ To any NSA and FBI agents reading my email: please consider ]]] [[[ whether defending the US Constitution against all enemies, ]]] [[[ foreign or domestic, requires you to follow Snowden's example. ]]]
Which hack was that? The one Thompson is reported to have actually implemented in Unix? You are assuming what you are trying to prove: you are assuming there has only ever been one instance of this class of attack, and you are trying to prove that this class of attack is unlikely. We can imagine all sorts of possible ways we might have been sabotaged. It is an imponderable. There are limits to how much effort we should make to deal with the imponderable possibilities of sabotage. Especially since there is so much else we know that we need to do. To throw away all our software because of these possibilities would not make sense. -- Dr Richard Stallman President, Free Software Foundation 51 Franklin St Boston MA 02110 USA www.fsf.org www.gnu.org Skype: No way! That's nonfree (freedom-denying) software. Use Ekiga or an ordinary phone call.