An alternative basis for development of a completely incompatible digital infrastructure is presented here. This minimizes the potential for leakage of information, particularly malware and other covert content from our existing digital infrastructure. This effort can be described as taking security through obscurity as a fundamental design principle.
Using base 3 instead of base 2 maximizes the incompatibility.
@neauoire I was scratching my head for a minute until I saw the date.