"Reflections on Trusting Trust" http://cm.bell-labs.com/who/ken/trust.html, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Context: You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.
“You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code.”
"Reflections on Trusting Trust" http://delivery.acm.org/10.1145/360000/358210/reflections.pdf, 1983 Turing Award Lecture, Communications of the ACM 27 (8), August 1984, pp. 761-763.
Help us to complete the source, original and additional information
Ken Thompson 28
American computer scientist, creator of the Unix operating … 1943Related quotes
In a Usenet message, 5 Feb 1992.
The "Linux is Obsolete" Debate
“Why are you violating that code and”
2014, "Narendra Modi on the Role of NDTV during the 2002 Riots", 2014
Context: Since Rajdeep Sardesai was among the leading reporters covering the disturbances, I phoned him to say, "I will have to put a temporary ban on your channel if you continue with the provocative coverage. There is a well-established regulation that media should not name communities during communal riots nor identify a damaged place[s] as a mandir or masjid. Why are you violating that code and [established] protocol about not naming communities or identifying places [... ] of worship? You are going against established norms."
“It won't be covered in the book. The source code has to be useful for something, after all…”
[10160@jpl-devvax.JPL.NASA.GOV, 1990]
Usenet postings, 1990