Steven D'Aprano <[EMAIL PROTECTED]> writes: > > It certainly does apply, if you're maintaining a program and someone > > submits a patch. In that case you neither click nor type the > > character. You'd normally just make sure the patched program passes > > the existing test suite, and examine the patch on the screen to make > > sure it looks reasonable. The phishing possibilities are obvious. > > Not to me, I'm afraid. Can you explain how it works? A phisher might be > able to fool a casual reader, but how does he fool the compiler into > executing the wrong code?
The compiler wouldn't execute the wrong code; it would execute the code that the phisher intended it to execute. That might be different from what it looked like to the reviewer. -- http://mail.python.org/mailman/listinfo/python-list