Name: Anonymous 2017-01-26 20:31
So how likely is it that there are hidden trojan horse-like vulnerabilities in common open source software that we haven't noticed? How valuable is the idea that we should start over and build our systems the right way to prevent that possibility at every step?