Any sufficiently complicated bruteforce algorithm contains an ad hoc, informally-specified, bug-ridden, slow implementation of half of judaforce algorithm.