Anton Karpov wrote:
> 
> Noone here talks about attacking a compiler ;)  We're discussing 
> differences
> for attacker, depending on compiler available or not.

They should.
There is a classic by Ken Thompson (I think) about using a compiler
to create a back door which has no traces in the source of either
the compiler or of the back-doored module.

Something about who can you trust.

Reply via email to