Encryption thats not a jig? Maybe try an open Encryption, like what could be used to decrypt. An algorithm that when run doesn't do anything except for the last step. Then its a fresh start where the code can be employed on the second pass. That way the target of sharing information is based on adjacent commands. That only works as intended so Encryption becomes obsolete. Like a "what are you doing".
Neat -- thanks!
Interestingly your post brought this to mind, and now I've got to go and look to see if the external review that Bruce Schneier wanted, ever happened:
https://www.newscientist.com/article/mg19426055-300-noise-keeps-spooks-out-of-the-loop/
-I can think of a use case, but it's pretty niche
PS I think there's a word missing above Figure 3 between "stuff" and "fingerprintable".
Probably a comma since it's a list of things. The addition of the oxford comma before and is also a nice touch ;)
including more esoteric stuff, fingerprintable LLM weights, and even program obfuscation.
Encryption thats not a jig? Maybe try an open Encryption, like what could be used to decrypt. An algorithm that when run doesn't do anything except for the last step. Then its a fresh start where the code can be employed on the second pass. That way the target of sharing information is based on adjacent commands. That only works as intended so Encryption becomes obsolete. Like a "what are you doing".