Countering Trusting Trust Through Diverse Double-Compiling (ddc)
Posted3 months agoActive3 months ago
dwheeler.comTechstory
calmpositive
Debate
20/100
Computer SecurityCompiler TrustHardware Security
Key topics
Computer Security
Compiler Trust
Hardware Security
The article discusses 'Diverse Double-Compiling (DDC)', a technique to counter the 'Trusting Trust' attack, with commenters sharing related experiences and insights on compiler trust and hardware security.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
58m
Peak period
1
0-1h
Avg / period
1
Key moments
- 01Story posted
Oct 12, 2025 at 10:39 PM EDT
3 months ago
Step 01 - 02First comment
Oct 12, 2025 at 11:37 PM EDT
58m after posting
Step 02 - 03Peak activity
1 comments in 0-1h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 13, 2025 at 6:10 AM EDT
3 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45564196Type: storyLast synced: 11/20/2025, 2:00:08 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
Huh... I'm no EE, but measuring the complexity of an analog circuit in gates seems odd to me. For starters, the added circuitry isn't just one gate. There's a few capacitors added as well. And something tells me if someone were to add a parasitic circuit like that, it'd have to link up all over the parent circuit to probe voltages. Obviously it wouldn't be noticeable in a finished product (much less in an IC), but I wonder how noticeable it would be at the design stage by other humans.
Surprisingly no mention of the Z80 "trap gates" in that section, as it's extremely relevant: https://retrocomputing.stackexchange.com/questions/11143/in-...