Thompson didn’t want to write about the usual things that Turing award winners write about— in fact, according to him,1 he didn’t want to write a paper at all. However, when he did finally write a paper (after putting it off for a year past the original deadline, see ~2:52:49 in the above video), he describes at a high level how the C compiler (itself a program written in C) parses and compiles C source code into machine code to set the stage for how the “Trojan horse” would be injected into the generated machine code while leaving the original input C source code seemingly unmodified.

  • Eldritch@piefed.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    Oh, same here. And if you like that video, the others are generally about the same level. She’s not generally doing reverse engineering and security analysis on her streams, much more general stuff. But she definitely comes off as knowing what she’s talking about.

    There is a British YouTuber though that has done a number of streams etc. on cracking game DRMs for old video games however. And he’s generally interesting too.