I suppose Ken Thompson's, "Reflections on Trusting Trust" is appropriate
here.  This kind of vulnerability has been known about for quite some
time, but did not have much relevance until the advent of ubiquitous
networking.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to