On 4/10/17 2:08 PM, Eric Scace wrote:
   This approach is known as “security through obscurity”, and is deprecated in 
the professional of information security. What one invents, another can 
discover.

   The most secure systems use well-documented algorithms with open-source 
software — widely scrutinized for bugs or implants, and therefore with 
well-understood performance limitations. The secrecy comes from good crypto key 
management.


The M-code is described in a fair amount of detail here:
www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA456656


_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to