07/09/2017 (Sun) 20:36:32
>>9158>This board is badly moderated in my opinion.
Your opinion + $3 will get you a cup of coffee.
Besides, what you go on to describe isn't shitty moderation, but a shitty userbase. And the userbase of every imageboard I'm aware of at the moment is fucking garbage. I suppose a moderator could delete posts by shitty users, but if they did that, the board would be left with nothing but a handful of posts I made months ago before I stopped coming here regularly. Unfortunately, there were only ever 2-3 good posters here. I was, by far, the best, and I'm not even that great.
As for your OP, what you're saying is mostly true, but it's not particularly interesting. Yes, you have to audit programs or write them yourself in order to trust that there's no malicious intent in them. But, as the poster who posted the pdf on the "Trusting Trust" attack points out, that's not enough. Here's where it gets even more fucked up: there is a mitigation for the "Trusting Trust" attack. It's called "diverse double compiling". You can look up the guy who came up with it for his Ph.D. dissertation. Name's Wheeler.
The thing is, it doesn't matter. So you know your compiler isn't compromised. Fine. What about the silicon you're running it on? Who audited that? Got an electron microscope and the semiconductor engineering chops to do it yourself?
You can stop using computers, personally, if you want. You're still in them. Unless you go up to the Canadian north and live a primitive, subsistence hunter-gatherer lifestyle, you're in the Black Iron Prison, baby.
Relax. WWIII is coming soon, then it'll all be over.