1993-11-05 - Re: trusting software

Header Data

From: doug@netcom.com (Doug Merritt)
To: cypherpunks@toad.com
Message Hash: 932d4d8d2fd75ecd825469358bae77dd092786f8bdc9455fd7ddd581c5406b95
Message ID: <199311051657.IAA20001@mail.netcom.com>
Reply To: N/A
UTC Datetime: 1993-11-05 16:57:45 UTC
Raw Date: Fri, 5 Nov 93 08:57:45 PST

Raw message

From: doug@netcom.com (Doug Merritt)
Date: Fri, 5 Nov 93 08:57:45 PST
To: cypherpunks@toad.com
Subject: Re: trusting software
Message-ID: <199311051657.IAA20001@mail.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


ogr@wyvern.wyvern.com (Jason Plank) said:
>	Phil Zimmerman solved this problem by supplying the source code for
>his product.  You can see for yourself that there are no backdoors.

This helps, but is imperfect. How many people will read their particular
copy in sufficient detail to ascertain that there aren't any obvious
backdoors added by e.g. a sneaky archive site maintainer, or some sneaky
cracker who found a way to modify the archived copy?

Furthermore, even close reading won't absolutely *guarantee* the lack of
backdoors in all cases, even if the reader is an expert on relevant
subjects.

We'll all continue to use software despite lack of absolute assurances,
but it's worth keeping in mind what the situation is.
	Doug





Thread