Anton Karpov wrote: > > Noone here talks about attacking a compiler ;) We're discussing > differences > for attacker, depending on compiler available or not.
They should. There is a classic by Ken Thompson (I think) about using a compiler to create a back door which has no traces in the source of either the compiler or of the back-doored module. Something about who can you trust.