Hi
My rationale behind writing this simple utility is as follows: Moving data
through a fully encrypted tunnel like SSH is too slow for me, so I use
netcat/socat for moving large chunks of data between systems. I don't want the
data to be easily identified and reproduced if it is somehow
On 13/09/2012 10:26, Michael Conrad wrote:
On 9/12/2012 10:42 PM, j...@jodybruchon.com wrote:
My rationale behind writing this simple utility is as follows: Moving
data
through a fully encrypted tunnel like SSH is too slow for me, so I use
netcat/socat for moving large chunks of data between
On 9/12/2012 10:42 PM, j...@jodybruchon.com wrote:
My rationale behind writing this simple utility is as follows: Moving data
through a fully encrypted tunnel like SSH is too slow for me, so I use
netcat/socat for moving large chunks of data between systems. I don't want the
data to be easily
I wrote a pipeline utility that performs an XOR of the data streamed through it
using a 32-bit key specified on the command line, intended mainly to serve as a
sort of poor man's encryption. It also includes an option that generates a
random key to stdout. Being new to BusyBox development, I hope
On Thursday 13 September 2012 04:42:31 j...@jodybruchon.com wrote:
I wrote a pipeline utility that performs an XOR of the data streamed through
it
using a 32-bit key specified on the command line, intended mainly to serve as
a
sort of poor man's encryption. It also includes an option that
I wrote a pipeline utility that performs an XOR of the data streamed through
it
using a 32-bit key specified on the command line, intended mainly to serve as
a
sort of poor man's encryption.
Hey Jody,
If you're going to do even poor encryption, better make sure it's not
*too* easily