Due on Wednesday, December 8 by 11:59pm

• Think of “trust” as an ingredient that can be used to a greater or lesser extent in the design of a software system. Do you think that trust can ever be completely removed from the system? Why or why not?

In a separate paragraph, reflect on the following questions.

• Since Stoll’s book was written, reports in the news of serious hacking incidents have grown tremendously. Do you think that the security landscape is significantly different now? Do you think that a person with Stoll’s attributes would be equally successful today? Why or why not?

Finally, I have reproduced Thompson’s self-reproducing program here: quine.c. Give it a try, for fun.

$gcc -o quine quine.c$ ./quine > quine2.c
$gcc -o quine2 quine2.c$ ./quine2


Turn-in instructions: commit your response to your reading responses Github repository. Please use the LaTeX template supplied in your repository. Be sure to turn in both your source .tex file and a compiled .pdf file.

You can generate a PDF from the template with the command:
\$ pdflatex reading10.tex

Please be sure to name your generated PDF reading10.pdf. You will need to install TeXLive on your personal computer to build LaTeX documents: macOS, Windows, Linux. CS Lab machines already have TeXLive installed.
• CSCI 331: Introduction to Computer Security, Fall 2021

CS 331 course website