Hmm, how does that thwart the attack exactly? It assumes you have access
to an unsubvertable oracle - (a set of 1 or more other compilers of which at
least one has not been subverted). Given that then, yes obviously, you can spot
Isn't that missing the point of "Reflections On Trusting Trust", somewhat? Or
have I skimmed over some key point in this new paper?