this post was submitted on 16 Jan 2026
25 points (87.9% liked)

Technology

1356 readers
52 users here now

A tech news sub for communists

founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] mathemachristian@hexbear.net 4 points 1 week ago (1 children)

Compile the compiler? I presume there is some version that isn't compomised? Or go all the way back to some bootstrapped c compiler?

[–] yogthos@lemmygrad.ml 4 points 1 week ago (1 children)

Like I said, the only way you could really trust it is if you're not using a compile to make it. You have to write a compiler directly in assembly and then use that to compile everything else.

[–] mathemachristian@hexbear.net 4 points 1 week ago (1 children)

What I'm saying is there is no need to write a whole new compiler in assembly, check out the bootstrapping article I linked.

Or, if there is some uncompomised older compiler version A, and a compromised version B built with A, then the source code for B can be fed to A to create a clean version. As in it might be hard to try to poison the supply chain now, if they haven't already. We can't be sure it isn't already poisoned, but if it actually isn't it's possible to catch such an attack.

[–] yogthos@lemmygrad.ml 4 points 1 week ago

The key problem is knowing whether something is compromised or not though, that why you can't use an existing compiler if you want to be sure. Meanwhile, bootstrapping involved building a minimal core in assembly and then progressively compiling the compiler using itself. That's basically how you build a whole new compiler starting with assembly.