Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Which I'd immediately use to reverse-engineer itself to see if there were any back doors. Of course they'd be expecting that, so I wouldn't find any.


My first 2 thoughts as well:) I suppose you'd need to RE it using a tool you trust. Might need to do that one, too. It's like a compiler trusting trust problem, but in reverse:)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: