Email or username:

Password:

Forgot your password?
Devil Lu Linvega

An alternative basis for development of a completely incompatible digital infrastructure is presented here. This minimizes the potential for leakage of information, particularly malware and other covert content from our existing digital infrastructure. This effort can be described as taking security through obscurity as a fundamental design principle.

Using base 3 instead of base 2 maximizes the incompatibility.

homepage.divms.uiowa.edu/~jone

3 comments
feistel :cert:

@neauoire I was scratching my head for a minute until I saw the date.

wvs

@neauoire You had me at maximal incompatibility.

Go Up