muddle
An a/c to announce, explain and discuss "muddle"
"muddle" is a "deniable encryption" scheme which I discovered (and maybe invented).
It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks.
Please follow, boost or @ me
Posts
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Just in case someone thinks I'm antisemitic or promoting an unfounded "blood libel" accusation: I'm not. All I'm saying is that the state of Israel isn't helping in the cause against antisemitism.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
https://www.youtube.com/watch?v=Ft9MCAwxjyA
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Based on this, the VFO has two purposes:
synchronise a phase-locked loop to the particular track speed (based on special track markings)report the speed back to the controller so that it can read data at the correct rate
That's really as far as I researched it. It may also be that finer adjustments to the data rate might happen during a track read? That would probably depend on the particular disk format and encoding used.
I think the above is OK to a certain level of approximation. Please let me know if I'm wildly off the mark.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
These "active clubs" seem like they could be a good thing to fake. We could learn how they operate and provide a good facsimile, but without the right-wing radicalisation.
Or maybe we're already doing that?
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
https://www.irishtimes.com/politics/2026/03/14/michael-healy-rae-what-does-irelands-wealthiest-td-own-and-what-is-it-worth/
#StiffCompetition
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Speaking of, it will be interesting to see if/how civil society in Hungary can rid itself of such ideological appointees now that the climate seems to be shifting...
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
#RuinABrandOrSlogan
#HashTagGames
#NeedsNoExplanation
#GodwinWuzHere
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Well, that's just me. It's applicable everywhere.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
I'd consider myself a recent convert to pessimism, inspired by Camus and the essay he wrote about pessimism being the moral choice. It ends with the line "consider Sisyphus happy," IIRC.
Just one other thing, and I think someone pretty much touched on it without giving a concrete example (talking about the precautionary principle), I don't think that the Y2K problem was solved by optimists. I think that it was pessimists that saw a problem, enumerated all the various reasons this could be very bad as well as the obstacles to achieving the required fixes, and then, turned that into action.
Actually one final, final thing, and that's that I appreciate that you do (IIRC) tease out differences between outlook (optimism vs pessimism) and the ideas of hope and action. I just believe that both of those are at least achievable by starting with a pessimistic view, and maybe (as I said, I'm a pessimist) that's an even better starting point than optimism. That said, both starting points can end up being an excuse not to hope or not to act. I don't have any problems with optimistic people (I don't consider it to be an automatic character flaw) but I think it might be worth considering the opposite view as well.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
(including me, if I have)
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
The platform has been transformed algorithmically to help turn it into a Nazi bar, but moderation is hard. Because of, as you know, people...
(with apologies to @Horse_ebooks )
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
So they adapt to build anti-distillation agent skills, just as the intellectuals adapted after the Anti-Rightist trap.
We are already seeing agent skills built specifically for job security. The performative skill looks comprehensive and demos well but omits the 20% of edge-case knowledge that makes it work in production — you are now more indispensable, not less. The poison pill encodes expertise faithfully but with subtle dependencies on context only you hold — internal wikis you maintain, terminology you coined, data pipelines you own — so removing you causes outputs to drift quietly until someone says “we need to bring them back on this.” The complexity moat makes the skill so architecturally entangled with your other work that extracting your knowledge is harder than keeping you around. You are now a load-bearing wall disguised as a decoration.
I wonder if this is something similar to the last AI boom, the one based on expert systems. I know that the technology had its limitations (but at least it was deterministic and actually included checkable logic) but one major reason that's often given for its failure was the sheer cost of encoding domain-specific knowledge. Maybe an unwritten part of the problem was that experts weren't particularly keen to make themselves redundant?
Anyway, mighty fine points raised there.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
[Thailand's authentic athlete's foot cream 25g] https://world.taobao.com/lang/en-us/goods/-100107358873.htm
(not a recommendation, although I do have a photo of a billboard in Thailand advertising something similar... it probably says something like "nobody knows the athlete's foot like the athlete's foot." Then again, I know of a shoe shop in Japan that's just called "Shoe" so idk.. things are just themselves-in-themselves? Let's just leave them at that... )
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
It's an idea I toyed with a long time ago (for a different application) and I'd be delighted to find out that someone else might be using the same thing.
Again, it's all just about seeing the / sign and jumping to (probably unwarranted) conclusions.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me