Skip to main content

Science Quote by Ken Thompson

"No amount of source-level verification or scrutiny will protect you from using untrusted code"

About this Quote

Thompson’s line lands like a shrug from someone who helped invent the modern computing world and then watched it grow a soft underbelly. It isn’t anti-testing cynicism so much as a cold statement about where trust actually lives in software: not in your diligence, but in the layers you can’t realistically audit. “Source-level verification” is the comforting ritual of engineers who believe the truth is on the page. Thompson points out the trap: the page is not the program.

The context is his famous “Trusting Trust” argument, where he describes a compiler that can be maliciously modified to insert a backdoor into compiled binaries while leaving the source code pristine. Even if you pore over the application’s source and the compiler’s source, a compromised compiler can re-infect its own future builds. Scrutiny becomes theatre, because the system that translates scrutiny into reality is itself the attack surface.

The subtext is an early warning about supply-chain security before we had the vocabulary for it: dependencies, build pipelines, signed artifacts, reproducible builds. He’s describing a recursion of trust - you can’t prove a tool is honest using the tool’s own outputs. It’s epistemology with shell scripts.

Why it works is its absolutism. “No amount” is a dare, a refusal to let readers retreat into “best practices” as moral cover. Thompson isn’t saying verification is useless; he’s saying it’s insufficient against adversaries who target the invisible seams. The only protection is replacing naive trust with engineered trust: diverse compilation, independent toolchains, verifiable builds, and a sober acceptance that software is, always, a social system with technical consequences.

Quote Details

TopicPrivacy & Cybersecurity
SourceKen Thompson, "Reflections on Trusting Trust" (Turing Award lecture/paper), Communications of the ACM, 1984.
Cite

Citation Formats

APA Style (7th ed.)
Thompson, Ken. (2026, January 16). No amount of source-level verification or scrutiny will protect you from using untrusted code. FixQuotes. https://fixquotes.com/quotes/no-amount-of-source-level-verification-or-87936/

Chicago Style
Thompson, Ken. "No amount of source-level verification or scrutiny will protect you from using untrusted code." FixQuotes. January 16, 2026. https://fixquotes.com/quotes/no-amount-of-source-level-verification-or-87936/.

MLA Style (9th ed.)
"No amount of source-level verification or scrutiny will protect you from using untrusted code." FixQuotes, 16 Jan. 2026, https://fixquotes.com/quotes/no-amount-of-source-level-verification-or-87936/. Accessed 25 Mar. 2026.

More Quotes by Ken Add to List
Ken Thompson on Trusting Trust: limits of source verification
Click to enlarge Portrait | Landscape

About the Author

Ken Thompson

Ken Thompson (born February 4, 1943) is a Scientist from USA.

29 more quotes available

View Profile

Similar Quotes

Ronald Reagan, President
Ronald Reagan
Dave Freudenthal, Politician

We use cookies and local storage to personalize content, analyze traffic, and provide social media features. We also share information about your use of our site with our social media and analytics partners. By continuing to use our site, you consent to our Privacy Policy.