Discussion about this post

User's avatar
Mike Pfleger's avatar

Neat -- thanks!

Interestingly your post brought this to mind, and now I've got to go and look to see if the external review that Bruce Schneier wanted, ever happened:

https://www.newscientist.com/article/mg19426055-300-noise-keeps-spooks-out-of-the-loop/

-I can think of a use case, but it's pretty niche

PS I think there's a word missing above Figure 3 between "stuff" and "fingerprintable".

W8LF's avatar

Encryption thats not a jig? Maybe try an open Encryption, like what could be used to decrypt. An algorithm that when run doesn't do anything except for the last step. Then its a fresh start where the code can be employed on the second pass. That way the target of sharing information is based on adjacent commands. That only works as intended so Encryption becomes obsolete. Like a "what are you doing".

No posts

Ready for more?