• Sign in
  • Sign up
Elektrine
EN
Log in Register
Modes
Overview Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline
  • Open on infosec.exchange

muddle

@muddle@infosec.exchange
mastodon 4.6.0-alpha.7+glitch

An a/c to announce, explain and discuss "muddle"

"muddle" is a "deniable encryption" scheme which I discovered (and maybe invented).
It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks.
Please follow, boost or @ me
0 Followers
0 Following
Joined February 23, 2025

Posts

Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 3d ago
@aral They were doing so well on calling out antisemitism as being an unfounded "blood libel" until the pictures of that IDF soldier smashing the face off Jesus (in effigy, on a cross) in Lebanon recently.

Just in case someone thinks I'm antisemitic or promoting an unfounded "blood libel" accusation: I'm not. All I'm saying is that the state of Israel isn't helping in the cause against antisemitism.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@BurritoSommelier I didn't intend for that to be a stock tip, honest!
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@ohmu @Bredroll probably closer to "libertarian" as in lack of regulation or "going their own way."

I do agree with you, by the way, and "Freedom Democrat(ic) Party" is probably a better translation even if it does sound kind of weird?
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@ohmu @Bredroll Well, 自由 has meanings of "freedom" or "liberty," and 自由に could mean "freely" or "liberally." I suppose that the latter is where the mistranslation comes from. Possibiru, anyway.
0
1
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 6d ago
@brouhaha @RueNahcMohr @infosecdj Thanks for the correction and loads of extra detail!
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 6d ago
@jayflo @brianbilston I think I was confusing him with Mr. Chombee...

https://www.youtube.com/watch?v=Ft9MCAwxjyA
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 6d ago
@brianbilston I got lost after rafe sinjin chomley...
1
1
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 18, 2026
@StefanThinks This will probably blow your mind:

https://www.buildingsofireland.ie/buildings-search/building/20512013/the-firkin-crane-centre-o-connell-square-cork-city-cork-city-cork-city
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 18, 2026
@infosecdj @RueNahcMohr This piqued my interest and got me wondering why a VFO (variable-frequency oscillator) would be used in a floppy controller. From what I guessed/researched, it seems that data tracks on the floppy surface are encoded at a fixed density. This would mean that tracks closer to the centre have less data compared to the outer tracks. Assuming a constant (or near-constant) angular speed, data from different tracks would be arriving at different rates.

Based on this, the VFO has two purposes:
synchronise a phase-locked loop to the particular track speed (based on special track markings)report the speed back to the controller so that it can read data at the correct rate
That's really as far as I researched it. It may also be that finer adjustments to the data rate might happen during a track read? That would probably depend on the particular disk format and encoding used.

I think the above is OK to a certain level of approximation. Please let me know if I'm wildly off the mark.
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 17, 2026
@mast0d0nphan @geekysteven I was going to reply to the original post (geekysteven's) and mention that if we didn't have any morals, we'd be setting up fake right-wing organisations in order to chase the billionaire dollars and use it to fund a secret resistance.

These "active clubs" seem like they could be a good thing to fake. We could learn how they operate and provide a good facsimile, but without the right-wing radicalisation.

Or maybe we're already doing that?
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 16, 2026
@DocAtCDI mine took a left turn as it was transiting between me small and large intestines. Now I've got appendixitis.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 16, 2026
@0xabad1dea Isn't that the default for all Dutch speakers?
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 16, 2026
@bruces whose personal Nam(shub (of Enki)) was this?
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 16, 2026
@brianbilston You do know youl'll be up agin the Healy-Raes if you ever decide to come to Kerry?

https://www.irishtimes.com/politics/2026/03/14/michael-healy-rae-what-does-irelands-wealthiest-td-own-and-what-is-it-worth/

#StiffCompetition
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 16, 2026
@Alice also therapy-style roles that can safely reintegrate the cultists back into "polite society."
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 16, 2026
@austinkocher I think it can be both personal revenge (Trump has form on this) and part of a broader strategy. That strategy is like the Reagan-era policy of redeploying "awkward" civil servants to posts where they can't do as much harm (there's also an element of "punishment" in this). Or it could be like a Gulenist-style infiltration of the apparatus of the government. Or perhaps a better comparison would be with how the right wing in the US takes its lead from places like Orbán's Hungary.

Speaking of, it will be interesting to see if/how civil society in Hungary can rid itself of such ideological appointees now that the climate seems to be shifting...
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 14, 2026
@davidgerard Hmm. If you put an immovable object perpendicular to an unstoppable force, would you create a wormhole at 45 degrees? Or do you have to locate the immovable object and unstoppable forces in different verses?
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 14, 2026
@metin well that's just peachy!
1
0
0
0
Open post
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 14, 2026
Hugo Boss, outfitters to the Nazis

#RuinABrandOrSlogan
#HashTagGames
#NeedsNoExplanation
#GodwinWuzHere
infosec.exchange

Infosec Exchange

13
0
4
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 13, 2026
@daedalus That's one of my touchstones, too. I keep seeing people around me who have been suckered into some really weird beliefs. I don't have to see the three-ring binder that they probably paid for (yeah, definite cult-like vibes around them...)... just observe their behaviour. It teaches them to shun empathy, dodge around awkward questions and favour hate over hope.
Well, that's just me. It's applicable everywhere.
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@shlee I know nothing about modern music but my sniff test detects traces of happy hardcore, cmat and kneecap. Not an altogether unpleasant bouquet.
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@citc yes, you are 100 right the eu's errelevence
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@citc "thoughts and prayer"
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@EUCommission "Hope is action." Really?
1
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@drwho @GGMcBG @beyondmachines1 hey! duck sphinx! I wrote a micro story about that the other day!
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@beyondmachines1 :rubberduck:
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@Daojoan Usually I agree with things you say in your articles, but I don't agree with this. For one thing, I think that maybe you're equating pessimism with defeatism in certain sections. Also, I think that some of your criticisms (especially the labelling "competitive pessimism") is more about the media than pessimism as a personal approach, if that makes sense.

I'd consider myself a recent convert to pessimism, inspired by Camus and the essay he wrote about pessimism being the moral choice. It ends with the line "consider Sisyphus happy," IIRC.

Just one other thing, and I think someone pretty much touched on it without giving a concrete example (talking about the precautionary principle), I don't think that the Y2K problem was solved by optimists. I think that it was pessimists that saw a problem, enumerated all the various reasons this could be very bad as well as the obstacles to achieving the required fixes, and then, turned that into action.

Actually one final, final thing, and that's that I appreciate that you do (IIRC) tease out differences between outlook (optimism vs pessimism) and the ideas of hope and action. I just believe that both of those are at least achievable by starting with a pessimistic view, and maybe (as I said, I'm a pessimist) that's an even better starting point than optimism. That said, both starting points can end up being an excuse not to hope or not to act. I don't have any problems with optimistic people (I don't consider it to be an automatic character flaw) but I think it might be worth considering the opposite view as well.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@0xabad1dea It's almost like you were visiting Japan... your Japanese is great... can you use chopsticks?
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@hacks4pancakes what's even more rankling is that "buy the dip" will continue to be a winning strategy... even when it's Palantir we're talking about...
3
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@brianbilston sorry if I've been over-replying to your daily poems but "may the forces of evil get confused on their way to your door"

(including me, if I have)
1
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@danirabbit I made a similar point recently, pointing out that apologising for AI is like apologising for slavery. In retrospect (and I apologised for it) I shouldn't have made the point where/when I did. I still stand up for the basic premise, though.
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@tillybridges https://www.youtube.com/watch?v=io-t-bUkfY8

Yeah! Science!
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@codinghorror "Unfortunately, as you probably already know, [also] people"

The platform has been transformed algorithmically to help turn it into a Nazi bar, but moderation is hard. Because of, as you know, people...

(with apologies to @Horse_ebooks )
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@mattblaze I've still got my ape suit from the time John Glenn came back in 1998.
4
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 10, 2026
@qurlyjoe gotta admit... it took me significantly longer than a nano-century to figure out what this was saying.
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 10, 2026
@jenniferplusplus I think that another way of looking at this might be to say that we have an unusually high number of people here who understand power and recognise its application, but who just aren't that interested in wielding it themselves. And I think that's probably true. Calling out abuses of power kind of falls naturally out of our attitude to power in the first place?
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 10, 2026
@cstross It's all very mysterious. It reminds me very much of the film noir genre.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 09, 2026
@zaphodb @schrotthaufen @neurovagrant Or even S4... Shamir's Secret Sharing Scheme (for data redundancy)
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 09, 2026
@ai6yr Quoting from that:

So they adapt to build anti-distillation agent skills, just as the intellectuals adapted after the Anti-Rightist trap.

We are already seeing agent skills built specifically for job security. The performative skill looks comprehensive and demos well but omits the 20% of edge-case knowledge that makes it work in production — you are now more indispensable, not less. The poison pill encodes expertise faithfully but with subtle dependencies on context only you hold — internal wikis you maintain, terminology you coined, data pipelines you own — so removing you causes outputs to drift quietly until someone says “we need to bring them back on this.” The complexity moat makes the skill so architecturally entangled with your other work that extracting your knowledge is harder than keeping you around. You are now a load-bearing wall disguised as a decoration.

I wonder if this is something similar to the last AI boom, the one based on expert systems. I know that the technology had its limitations (but at least it was deterministic and actually included checkable logic) but one major reason that's often given for its failure was the sheer cost of encoding domain-specific knowledge. Maybe an unwritten part of the problem was that experts weren't particularly keen to make themselves redundant?

Anyway, mighty fine points raised there.
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@stavvers https://www.youtube.com/watch?v=B_m17HK97M8
0
0
0
0
Open post
Boosted by Charlie Stross @cstross@wandering.shop
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@cstross@wandering.shop Is it that time already?

https://www.youtube.com/watch?v=pi_YQul7XXk
5
0
3
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@brianbilston Nobody knows the Athlete's Foot like (the makers of) Thailand's Athlete Foot Cream...

[Thailand's authentic athlete's foot cream 25g] https://world.taobao.com/lang/en-us/goods/-100107358873.htm

(not a recommendation, although I do have a photo of a billboard in Thailand advertising something similar... it probably says something like "nobody knows the athlete's foot like the athlete's foot." Then again, I know of a shoe shop in Japan that's just called "Shoe" so idk.. things are just themselves-in-themselves? Let's just leave them at that... )
1
2
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@neauoire Thanks. I've got the paper loaded up in another tab for later reading.
infosec.exchange

muddle: "@neauoire@merveilles.town Thanks. I've got the pa…" - Infosec Exchange

0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@mastodonmigration @jeeynet Reminds me of the problems that Edwyn Collins had many years ago, pre-"AI." Of course, this time around it's much more deliberate and mechanised. What a timeline!
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 07, 2026
@neauoire Only just came across this stuff you're doing recently and it looks fascinating. I wonder how you implement bags in the background. Since you use the / operator to remove or replace things I was wondering if perhaps each bag is a bignum with entities inside the sets (sorry, bags) represented by distinct prime numbers, and the bag as a whole being the product of all members...

It's an idea I toyed with a long time ago (for a different application) and I'd be delighted to find out that someone else might be using the same thing.

Again, it's all just about seeing the / sign and jumping to (probably unwarranted) conclusions.
0
2
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@brianbilston At least he had Shriving Time (for the weekend that was in it)
1
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice I can Iron man it for you if you give me something to work with.
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice what straw man am I conjuring up for you?
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice @petergleick so you're denying that you're treating Trump and his predecessors as equals?
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@rmondello There are levels of madness here, aren't there?
0
0
1
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: mail.elektrine.com:993

POP3: mail.elektrine.com:995

SMTP: mail.elektrine.com:587

IMAP/POP3 use TLS. SMTP uses STARTTLS.

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 07:59:48 UTC