Read the classic Ken Thompson article Reflections on Trusting Trust. Answer the following questions:
Describe briefly and clearly how the attack on the compiler works.
If you suspect that your machine has been compromised, what should you do about it?
What other kinds of software like compilers do we usually trust that have the potential to be compromised?
Submit a PDF via Learning Suite.