Search results

Jump to: navigation, search
Result 1 of 1
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  • ...for a trustworthy binary. See the [http://wiki.c2.com/?TheKenThompsonHack Ken Thompson hack] for details. Wallets with a deterministic build process (e.g
    16 KB (2,668 words) - 21:08, 12 February 2017