I recently wrote a deep dive exploring the famous talk "Reflections on Trusting Trust" by Ken Thompson — the one where he describes how a compiler can be tricked to insert a Trojan horse that reproduces itself even when the source is "clean".
In the post I cover:
• A walkthrough of the core mechanism (quines, compiler “training”, reproduction).
• Annotated excerpts from the original nih example (via Russ Cox) and what each part does.
• Implications today: build-tool trust, reproducible builds, supply-chain attacks.
If you’re interested in compiler internals, toolchain security, or historical hacks in UNIX/CS, I’d love your feedback or questions.
🔗 You can read it here: https://micahkepe.com/blog/thompson-trojan-horse/
[link] [comments]









![The Gang Republic: Inside Haiti’s New Order (2026) - ~3 million people living in the grips of all-out gang war. France24 spent a fortnight filming in and around the Haitian capital, speaking to a population held hostage by this drawn-out crisis (CC) [00:52:38]](https://external-preview.redd.it/0j1B98qWy2MAsjLEwjT10EbknBToMVuWRJ-tUeZsTso.jpeg?width=320&crop=smart&auto=webp&s=041d55dee546ef807e7eda2e0d1d013111f02a25)

English (US) ·