3 Comments
User's avatar
Mike Pfleger's avatar

Neat -- thanks!

Interestingly your post brought this to mind, and now I've got to go and look to see if the external review that Bruce Schneier wanted, ever happened:

https://www.newscientist.com/article/mg19426055-300-noise-keeps-spooks-out-of-the-loop/

-I can think of a use case, but it's pretty niche

PS I think there's a word missing above Figure 3 between "stuff" and "fingerprintable".

Taha Zouhair's avatar

Probably a comma since it's a list of things. The addition of the oxford comma before and is also a nice touch ;)

including more esoteric stuff, fingerprintable LLM weights, and even program obfuscation.

W8LF's avatar

Encryption thats not a jig? Maybe try an open Encryption, like what could be used to decrypt. An algorithm that when run doesn't do anything except for the last step. Then its a fresh start where the code can be employed on the second pass. That way the target of sharing information is based on adjacent commands. That only works as intended so Encryption becomes obsolete. Like a "what are you doing".