"No amount of source-level verification or scrutiny will protect you from using untrusted code"
About this Quote
The context is his famous “Trusting Trust” argument, where he describes a compiler that can be maliciously modified to insert a backdoor into compiled binaries while leaving the source code pristine. Even if you pore over the application’s source and the compiler’s source, a compromised compiler can re-infect its own future builds. Scrutiny becomes theatre, because the system that translates scrutiny into reality is itself the attack surface.
The subtext is an early warning about supply-chain security before we had the vocabulary for it: dependencies, build pipelines, signed artifacts, reproducible builds. He’s describing a recursion of trust - you can’t prove a tool is honest using the tool’s own outputs. It’s epistemology with shell scripts.
Why it works is its absolutism. “No amount” is a dare, a refusal to let readers retreat into “best practices” as moral cover. Thompson isn’t saying verification is useless; he’s saying it’s insufficient against adversaries who target the invisible seams. The only protection is replacing naive trust with engineered trust: diverse compilation, independent toolchains, verifiable builds, and a sober acceptance that software is, always, a social system with technical consequences.
Quote Details
| Topic | Privacy & Cybersecurity |
|---|---|
| Source | Ken Thompson, "Reflections on Trusting Trust" (Turing Award lecture/paper), Communications of the ACM, 1984. |
| Cite |
Citation Formats
APA Style (7th ed.)
Thompson, Ken. (2026, January 16). No amount of source-level verification or scrutiny will protect you from using untrusted code. FixQuotes. https://fixquotes.com/quotes/no-amount-of-source-level-verification-or-87936/
Chicago Style
Thompson, Ken. "No amount of source-level verification or scrutiny will protect you from using untrusted code." FixQuotes. January 16, 2026. https://fixquotes.com/quotes/no-amount-of-source-level-verification-or-87936/.
MLA Style (9th ed.)
"No amount of source-level verification or scrutiny will protect you from using untrusted code." FixQuotes, 16 Jan. 2026, https://fixquotes.com/quotes/no-amount-of-source-level-verification-or-87936/. Accessed 2 Mar. 2026.


