Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers

David A. Wheeler's Page on Countering 'Trusting Trust' through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers

@Yuvalne The #TrustingTrust guy from whose work we then got #DiverseDoubleCompiling?

Anyway yes trust boundaries are cell boundaries. Don't share unnecessary compromising information with outsiders.